The latest and greatest from Splunk Observability to help keep your entire stack up and running, no matter where it’s deployed or who’s troubleshooting.
Announcing the latest feature enhancements in Splunk IT Service Intelligence (ITSI) 4.19, designed to operationalize the way organizations manage their IT services.
Vulnerability, threat and risk are three fundamental concepts in cybersecurity. Learn from industry experts how they differ and play out in IT environments.
A cyber kill chain framework can help organizations to better understand and combat attacks. Learn about the evolution and applications of the cyber kill chain.
Threat hunting is a proactive approach that harnesses human intuition and creativity to identify and counter security incidents that may otherwise go undetected.
Incident severity levels indicate how an incident impacts your customers, so you can prioritize and respond appropriately. Learn how to define and use them.
DoS attacks have a long history, but they’re also predicted to get worse in 2023. Find out the many ways they work and learn to prevent them in the first place.
Effective communication forms the foundation for an effective workplace. Creating an inclusive work environment has become a necessity for organizations that are striving for success, growth, and innovation.
Discover the world of technical support engineering! Learn about responsibilities, required skills, certifications, and salary insights for this in-demand career path
Learn data lifecycle management (DLM) to effectively manage data throughout its lifecycle, from creation to deletion, ensuring security and compliance.
Discover the significance of data monitoring: make informed decisions, optimize processes, mitigate risks and improve data quality with an automated system.
Announcing new innovations in Splunk IT Service Intelligence (ITSI) that will help make your life easier, helping you see faster time to value with more accuracy and clarity than ever before.
Introducing a new addition to the Splunk unified security operations experience: Splunk Attack Analyzer (formerly Twinwave), which automates threat analysis of suspected malware or credential phishing threats.
In this blog post, we will explore ideas for promoting inclusive language in IT-related content, ensuring that our words reflect the values of inclusivity.