The latest and greatest from Splunk Observability to help keep your entire stack up and running, no matter where it’s deployed or who’s troubleshooting.
Announcing the latest feature enhancements in Splunk IT Service Intelligence (ITSI) 4.19, designed to operationalize the way organizations manage their IT services.
Vulnerability, threat and risk are three fundamental concepts in cybersecurity. Learn from industry experts how they differ and play out in IT environments.
A cyber kill chain framework can help organizations to better understand and combat attacks. Learn about the evolution and applications of the cyber kill chain.
Threat hunting is a proactive approach that harnesses human intuition and creativity to identify and counter security incidents that may otherwise go undetected.
Incident severity levels indicate how an incident impacts your customers, so you can prioritize and respond appropriately. Learn how to define and use them.
DoS attacks have a long history, but they’re also predicted to get worse in 2023. Find out the many ways they work and learn to prevent them in the first place.
Simple Network Management Protocol (SNMP) allows administrators to maintain nearly all aspects of a network — here are the tools and commands admins can put to use.
Remote code execution vulnerability can leave your organization open to attack of all kinds. Discover how attacker utilize RCE, and how you can best defend against common tactics.
The Splunk Threat Research team shares insights on the CVE-2023-27350 vulnerability, proof of concept scripts, setting up Splunk logging, and detecting adversaries for secure printing.
Splunk continues its commitment to state and local government and higher education by achieving an 'Authorized' designation from the State Risk and Authorization Management Program (StateRAMP®).
Learn how you can use Splunk's identifier reputation analysis playbooks to implement a workflow that will help your team automate the alert and quarantine processes for potential threats based on key identifiers.
The Splunk Threat Research Team provides a deep dive analysis of the RedLine Stealer threat and shares valuable insights to help enable blue teamers to defend against and detect this malware variant.