Skip to main content
false
Leadership
6 Min Read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

Security

Learn

Latest Articles

Learn 6 Min Read

ELT: Extract Load Transform, Explained

ELT is fundamentally different from the traditional ELT process: see what ELT offers, including massive flexibility, in this complete guide.
Learn 8 Min Read

Customer Data Analytics: An Introduction

In this blog post, we'll take a look at the important role of customer data analytics in the modern digital enterprise.
Learn 7 Min Read

What is a Data Platform?

Data platforms are the key to truly becoming a data-driven organization. Learn what you're missing without a modern data platform.
Learn 12 Min Read

What Is OpenTelemetry? A Complete Introduction

In this blog post we'll take a look at OpenTelemetry and its important role in Observability for the modern digital Enterprise.
Learn 5 Min Read

Insider Threats in Cybersecurity

Security anything isn't limited to outsiders. People on the inside can breach your security too. Read how in this guide to insider threats.
Observability 5 Min Read

Observability for Sustainability

For the past 20 years, the various stakeholder communities that together constitute the IT industry have attempted to address sustainability. Could observability help in practicing sustainable IT and improving the carbon footprint reduction in its operations?
Security 10 Min Read

More Than Just a RAT: Unveiling NjRAT's MBR Wiping Capabilities

The Splunk Threat Research Team (STRT) provides a deep-dive analysis of NjRAT (or Bladabindi), a Remote Access Trojan (RAT) discovered in 2012 that's still active today.
Learn 9 Min Read

Customer Data Management (CDM): An Introduction

In this blog post, we'll take a look at the important role of Customer Data Management for IT and other professionals.
Learn 7 Min Read

Cyber Hygiene: Introduction and Best Practices

One approach to a cybersecurity strategy, cyber hygiene is the way of creating a structured, intelligent environment that reduces the risk of contamination.