The latest and greatest from Splunk Observability to help keep your entire stack up and running, no matter where it’s deployed or who’s troubleshooting.
Announcing the latest feature enhancements in Splunk IT Service Intelligence (ITSI) 4.19, designed to operationalize the way organizations manage their IT services.
Vulnerability, threat and risk are three fundamental concepts in cybersecurity. Learn from industry experts how they differ and play out in IT environments.
A cyber kill chain framework can help organizations to better understand and combat attacks. Learn about the evolution and applications of the cyber kill chain.
Threat hunting is a proactive approach that harnesses human intuition and creativity to identify and counter security incidents that may otherwise go undetected.
Incident severity levels indicate how an incident impacts your customers, so you can prioritize and respond appropriately. Learn how to define and use them.
DoS attacks have a long history, but they’re also predicted to get worse in 2023. Find out the many ways they work and learn to prevent them in the first place.
Explore the essential aspects of application security: threats, requirements, and best practices. Learn how to safeguard your applications and data effectively.
Threat Intelligence Management enables analysts to fully investigate security events or suspicious activity by providing the relevant and normalized intelligence to better understand threat context and accelerate time to triage.
A technical overview of the Splunk App for Anomaly Detection, which uses machine learning to automatically configure anomaly detection jobs on time series data.
Explore the evolving landscape of IT Operations (ITOps) in the modern tech era. Learn how ITOps, DevOps, and AIOps intersect to ensure stable, efficient IT ecosystems for business success.
Let's look at how to use the popular Splunk Stream App for our favorite purpose: threat hunting! This is part of our Threat Hunting with Splunk series.
Understand network configuration: what it means, why you need it, the six most common types, and tools and topics for monitoring and managing your network.
For this month’s edition of Playbook of the Month, we’ll look at how you can perform investigations at machine speed using Splunk SOAR and one of our investigation playbooks, Internal Host WinRM Investigate.