Skip to main content
false
Leadership
6 Min Read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

Security

Learn

Latest Articles

Splunk Life 2 Min Read

Becoming Santa Claus

Bonnie Rosensteel, Director of Professional Services Contract Operations at Splunk, shares how she's giving back and helping Splunkers grow.
Observability 3 Min Read

State of Observability 2024 Reveals How Leaders Outpace Their Peers

In the State of Observability 2024, we identify organizations that are outperforming their peers and share their key characteristics and outcomes achieved.
Learn 6 Min Read

User Acceptance Testing (UAT): Definition, Types & Best Practices

User acceptance testing, or UAT, is an important part of finalizing any new feature or product. Learn why to do it, and then learn how, all in this article.
Learn 8 Min Read

What Is CX? Customer Experience, Defined

Customer experience (CX) is integral to every business today. Learn what CX means, why it matters, and how to improve CX for your customers here.
Tips & Tricks 8 Min Read

CI/CD Automation for Splunk Apps using Github Actions

Splunker Patrick King explains how to replace local, by-hand app development with a fully source-controlled, CI/CD-automated workflow.
Security 3 Min Read

Macro ATT&CK for a TTP Snack

Splunk's Mick Baccio and Ryan Fetterman explore 2024's macro-level cyber incident trends through the lens of the MITRE ATT&CK framework.
Learn 15 Min Read

What Is Network Configuration?

In this post, we'll do a deep dive into network configuration and include best practices for keeping networks up and running
Security 3 Min Read

Introducing Splunk Attack Range v3.1

The Splunk Threat Research Team is happy to release v3.1 of Splunk Attack Range.
Security 3 Min Read

Vulnerability Prioritization Is a Treat for Defenders

There have been numerous high-profile cybersecurity incidents where vulnerability management had an impact on severe breaches – here are some notable examples.