The latest and greatest from Splunk Observability to help keep your entire stack up and running, no matter where it’s deployed or who’s troubleshooting.
Announcing the latest feature enhancements in Splunk IT Service Intelligence (ITSI) 4.19, designed to operationalize the way organizations manage their IT services.
Vulnerability, threat and risk are three fundamental concepts in cybersecurity. Learn from industry experts how they differ and play out in IT environments.
A cyber kill chain framework can help organizations to better understand and combat attacks. Learn about the evolution and applications of the cyber kill chain.
Threat hunting is a proactive approach that harnesses human intuition and creativity to identify and counter security incidents that may otherwise go undetected.
Incident severity levels indicate how an incident impacts your customers, so you can prioritize and respond appropriately. Learn how to define and use them.
DoS attacks have a long history, but they’re also predicted to get worse in 2023. Find out the many ways they work and learn to prevent them in the first place.
Maximizing the quality and performance of a product doesn't end at launch — product analytics allow us to monitor and act on data to refine and optimize services
Applied observability is one of the most important emerging topics in tech and science, here's how teams use data as evidence to monitor and improve systems
We are pleased to share our 2022 Diversity Annual Report which summarizes our progress while also outlining opportunities for continued improvement and growth.
Not sure where to start with data dictionaries? Here's everything you need to know about data dictionary components, benefits, and how your team can create one.
Protecting customer data, especially PII, is absolutely critical for any business. Data anonymization is just one way security teams are securing data without sacrificing strong analysis.