Skip to main content
false
Leadership
6 Min Read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

Security

Learn

Latest Articles

Learn 4 Min Read

Ransomware & Extortionware in 2025: Stats & Trends

Ransomware is among the worst threats you face. Even worse? Ransomware keeps changing how it attacks. Get the latest ransomware trends & stats here.
Splunk Life 3 Min Read

Splunktern Spotlight: Izabela Golec

Meet Izabela Golec, a Software Development Intern based in our Krakow, Poland office. She shares her experience at Splunk, tips for prospective interns at Splunk and her advise for females considering a career in tech.
Learn 4 Min Read

Security Testing for Mobile Applications

The security of mobile apps is a critical point in your security posture. Get the full story on why and HOW to test the security of your mobile apps.
Learn 5 Min Read

What Is Data Architecture?

Data architecture determines how you can use your data. Read on to learn how to choose data storage, data pipeline and data management strategies.
Learn 5 Min Read

The National Cyber Workforce & Education Strategy (NCWES) Explained

Learn about the National Cyber Workforce & Education Strategy, a U.S. program for shaping the future of cybersecurity by promoting cybersecurity education.
Observability 4 Min Read

How To Set Up Monitoring for Your Hybrid Environment

Splunk meets the demands of today to deliver comprehensive observability in hybrid environments.
Learn 4 Min Read

Secure AI System Development

CISA & NCSC have issued joint guidelines for developing secure AI systems. Let's understand these guidelines, so we can mitigate risk in AI development.
Industries 5 Min Read

Using Amazon SageMaker to Predict Risk Scores from Splunk

Splunker Nimish Doshi covers using Amazon SageMaker and Splunk to further develop a fraud detection use case to predict future risk scores.
Learn 5 Min Read

Data Breach Defined & Ways To Prevent One in 2025

Data breaches can happen in many ways — ransomware, phishing, accidental exposure — but one thing is clear: our data is being breached all the time.