false
Leadership
3 Min Read
Splunk's CISO Report explores the gaps between CISOs and their boards, and shares best practices to help CISOs reach across the aisle.

Featured Articles

Security

Learn

Latest Articles

Partners 1 Min Read

Splunk Cloud to Launch on AWS Middle East (UAE) Region

We are excited to share our plans for the expected launch of Splunk's instance on the Amazon Web Services (AWS) Region in the United Arab Erimates (UAE) in late 2024.
Learn 6 Min Read

What Is Syslog?

Learn what Syslog is and how it can help you identify and troubleshoot problems as an IT professional.
Tips & Tricks 2 Min Read

AWS Technical Add-on: Simplifying Error Data Re-ingestion

Ranjit Kalidasan of AWS and Splunk's Antoni Komorowski share a significant update to the AWS Technical Add-on for Splunk.
Learn 8 Min Read

Brute Force Attacks: Techniques, Types & Prevention

Yes, brute force attacks remain a major threat in 2023. Get the latest on brute force attacks: types, trends, business impacts & how to prevent them.
Learn 4 Min Read

What Is FIDO2?

Get all the details on FIDO2, the latest authentication technology that many organizations around the world are adopting.
Learn 3 Min Read

What Is Intelligent Automation?

Intelligent automation is smarter than more traditional forms of IT automation. Take a look at what intelligent automation can do for you today.
Learn 8 Min Read

SQL for Data Science: Introduction & Tutorial

SQL is among the most powerful tools a data scientist can use. Get the full introduction for using SQL for data science in this complete guide.
Learn 3 Min Read

What Is Public Key Infrastructure (PKI)?

A full introduction to PKI: Public Key Infrastructure (PKI) is the cryptography framework used to protect and authenticate digital communications.
Security 14 Min Read

Splunk Tools & Analytics To Empower Threat Hunters

Calling all threat hunters! This article dives into the many Splunk tools and analytics that can help threat hunters in their day-to-day hunting activities.