Skip to main content
false
Leadership
6 Min Read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

Security

Learn

Latest Articles

Learn 7 Min Read

What is Penetration Testing (Pen Testing)?

Learn about penetration testing — simulating attacks to find security weaknesses. Plus: the six pentesting stages, sample tools and hands-on examples.
Security 6 Min Read

Security Insights: Investigating Ivanti Connect Secure Auth Bypass and RCE

The Splunk Threat Research Team has swiftly developed Splunk analytics and hunting queries, helping defenders quickly adapt and respond to emerging threats CVE-2023-46804 and CVE-2024-21887.
Industries 4 Min Read

When to Automate Recurring Events

Splunk has a public repository of automations for our Security Orchestration and Automation Response (SOAR) tool – the only limit is your imagination.
Observability 7 Min Read

How to Customise Detectors for Even Better Alerting

Discover how to create a Custom Detector and explore first-hand how the right customizations can turn an alert storm into meaningful insights with Splunk Observability Cloud.
Industries 4 Min Read

Building the NextGen Factory with Splunk and Bosch Rexroth

For centuries there have been many wise sayings on how to deal with disruptions and prevail amidst uncertain circumstances. Read on to learn how Splunk and Bosch Rexroth are building the next-generation factory to help manufacturers elevate their resilience and take advantage of new market trends and operating models.
Tips & Tricks 5 Min Read

Scale Your Splunk Cloud Operations With The Splunk Content Manager App

To address the absence of a solution that simplifies the administration of Splunk instances and aligns with Splunk's ultimate goal of focusing on generating value from data, we created the App Content Manager for Splunk.
Security 11 Min Read

Hypothesis-Driven Cryptominer Hunting with PEAK

A sample hypothesis-driven hunt, using SURGe's PEAK threat hunting framework, looking for unauthorized cryptominers.
Observability 5 Min Read

How to Create Great Alerts

Splunker Koray Harman highlights alerting scenarios to avoid and explores some of the ways to create and customize alerts in Splunk Observability Cloud to go from noise to action and improve your MTTx.
Learn 5 Min Read

Cybersecurity Trends: 8 Critical Trends to Watch

Calling all CISOs, security pros & anyone into security: Be prepared (and know how to prepare) for the biggest cyber threats and trends today.