The latest and greatest from Splunk Observability to help keep your entire stack up and running, no matter where it’s deployed or who’s troubleshooting.
Announcing the latest feature enhancements in Splunk IT Service Intelligence (ITSI) 4.19, designed to operationalize the way organizations manage their IT services.
Vulnerability, threat and risk are three fundamental concepts in cybersecurity. Learn from industry experts how they differ and play out in IT environments.
A cyber kill chain framework can help organizations to better understand and combat attacks. Learn about the evolution and applications of the cyber kill chain.
Threat hunting is a proactive approach that harnesses human intuition and creativity to identify and counter security incidents that may otherwise go undetected.
Incident severity levels indicate how an incident impacts your customers, so you can prioritize and respond appropriately. Learn how to define and use them.
DoS attacks have a long history, but they’re also predicted to get worse in 2023. Find out the many ways they work and learn to prevent them in the first place.
CIM is a standard approach to represent & describe diverse system components. Read on to learn all about CIM, core concepts, and the benefits it brings to organizations.
IT monitoring is a powerful thing! One flavor focuses solely on monitoring all your cloud workloads. Get the full details here in this comprehensive article.
Let's answer the question "What exactly is IT infrastructure?" We'll drill down on the different types and categories of IT infrastructure, how to manage it, as well as what the future holds.
Observability has been tied up with causality from its origins in the mathematical realm of control theory in the early 1960s. But what precisely does the term ‘causality’ denote? In how does correlation come into play when it comes to observability? Read on to find out more.
Get to know Splunker Alexandra Nuttbrown, one of the co-leads of our Womxn+ Employee Resource Group which helps foster, empower and grow a diverse womxn-led community.
Explore applied model-assisted threat hunting for dictionary-based domain generation algorithms using the SURGe Security Research Team's PEAK Threat Hunting Framework.
Data security is more important than ever. With organizations relying heavily on technology for their sensitive information, the risk of data breaches is constantly rising.