The latest and greatest from Splunk Observability to help keep your entire stack up and running, no matter where it’s deployed or who’s troubleshooting.
Announcing the latest feature enhancements in Splunk IT Service Intelligence (ITSI) 4.19, designed to operationalize the way organizations manage their IT services.
Vulnerability, threat and risk are three fundamental concepts in cybersecurity. Learn from industry experts how they differ and play out in IT environments.
A cyber kill chain framework can help organizations to better understand and combat attacks. Learn about the evolution and applications of the cyber kill chain.
Threat hunting is a proactive approach that harnesses human intuition and creativity to identify and counter security incidents that may otherwise go undetected.
Incident severity levels indicate how an incident impacts your customers, so you can prioritize and respond appropriately. Learn how to define and use them.
DoS attacks have a long history, but they’re also predicted to get worse in 2023. Find out the many ways they work and learn to prevent them in the first place.
Learn how to protect your organization against rising security breaches. Explore common breach types, real-world examples, and effective prevention strategies.
Discover the power of federated data systems: enhanced privacy, innovation, and decentralized storage — and get key insights into implementation challenges.
SURGe, Splunk’s strategic security research team, examines the cyber threat landscape across different industries in a new podcast series called The Security Detail.
As we gear up to the summer F1 races with Canada this weekend before F1 heads to Europe, we sat down with Lando Norris and new McLaren driver Oscar Piastri to discover what makes them both tick on and off the track.
Learn how purple teams bridge the gap between offensive and defensive security strategies, and are helping organizations identify and mitigate risks effectively