false
Watch the .conf25 Global Broadcast on demand
Watch the .conf25 Global Broadcast on demand
Splunk Blogs
Leadership
3 Min Read
Kamal Hathi shares how Cisco and Splunk deliver the data foundation, agentic intelligence, and cross-domain insights needed to build a more secure, resilient, and always-on digital enterprise.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Learn 6 Min Read

Cybersecurity Policies: Types & Best Practices

Learn how to structure effective cybersecurity policies to protect critical systems, address evolving threats, and meet regulatory obligations.
Observability 6 Min Read

The Observability Center of Excellence, Part II: From Pitch to Formation

Dive into the steps to form your very own Observability Center of Excellence (CoE) team.
Observability 3 Min Read

KubeCon + CloudNativeCon North America: Know Before You Go

Splunker Greg Leffler shares essential advice to prepare for KubeCon and CloudNativeCon North America 2024.
Learn 5 Min Read

NOCs vs. SOCs: Network & Security Operations Centers Compared

NOCs and SOCs share similar goals, but they achieve them by monitoring different IT operational areas. Learn the difference here.
Learn 9 Min Read

The Platform Engineer Role Explained: Who Is a Platform Engineer?

Interested in becoming a platform engineer? Need to hire one? Let's dive into this topic and learn about platform engineer responsibilities.
Splunk Life 2 Min Read

Life as a Product Management Intern: Austin Wilson

Product Management Intern Austin Wilson shares his experience at Splunk, working remotely from Boulder, CO while giving back and using Splunk for good.
Learn 7 Min Read

Hacking 101: Black Hat vs. White Hat vs. Gray Hat Hacking

What's the difference between black hat, white hat, and gray hat? Read on to learn about these hacking categories.
Learn 14 Min Read

What Is Incident Response?

In this post, we'll cover what incident response is and why it's essential for organizations to protect themselves from digital threats.
Security 12 Min Read

ValleyRAT Insights: Tactics, Techniques, and Detection Methods

The Splunk Threat Research Team conducts an analysis for several variants of ValleyRAT’s malware samples to extract its MITRE ATT&CK tactics, techniques, and procedures (TTPs).