Skip to main content
false
Leadership
6 Min Read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

Security

Learn

Latest Articles

Tips & Tricks 1 Min Read

New Year, New Ideas, and New Self-Help Articles

Customers at any stage of their organizational resilience journey can benefit from the action-oriented, self-help content available free on Splunk Lantern.
Security 3 Min Read

Supercharge Cybersecurity Investigations with Splunk and Graphistry: A Powerful Combination for Interactive Graph Exploration

In this blog post, we'll dive deeper into how combining Splunk and Graphistry can help you unlock new capabilities for your cybersecurity investigations and gain better resilience for your organization.
Observability 7 Min Read

Custom Metrics and their importance in Observability

Leveraging custom metrics and having complete control into how all metrics are collected and are sent into your O11y platform, is key to managing the complex modern platforms of today (and those of tomorrow!). Read more on the blog.
Industries 6 Min Read

Short Staffed? Try Using SOAR to Augment Your Security Team

Splunk's Frank Myers looks at two industries affected by short staffing – higher education and state and local governments – and explains how Splunk SOAR can help.
Learn 5 Min Read

ISO 27002: Information Security Controls Explained

In this article, we will look at the origin story of the ISO 27002 standard, as well as its structure, and how to apply the guidelines.
Security 6 Min Read

Building Large-Scale User Behavior Analytics: Data Validation and Model Monitoring

Splunk's Cui Lin explores fundamental techniques to validate data volume and monitor models to understand the size of your own UBA clusters.
Learn 10 Min Read

What is Threat Modeling?

Get started with threat modeling today. We’ll define threat modeling, discuss how it works, and share simple and advanced threat modeling frameworks.
Security 4 Min Read

Add to Chrome? - Part 1: An Analysis of Chrome Browser Extension Security

An overview of SURGe research that analyzed the entire corpus of public browser extensions available on the Google Chrome Web Store.
Learn 4 Min Read

CVSS: The Common Vulnerability Scoring System

Common Vulnerability Scoring System (CVSS) is a framework designed to provide a consistent and objective way to assess the severity of security vulnerabilities in IT systems. Learn more in this blog post.