Skip to main content
false
Leadership
6 Min Read
Splunk is now officially part of Cisco, bringing the full power of the network together with market-leading security and observability solutions.

Featured Articles

Security

Learn

Latest Articles

Learn 5 Min Read

Exploit Kits: Explained

Explore the dark world of exploit kits — automated hacking tools available on the dark web. Learn how they exploit vulnerabilities, their dangers and possible defense strategies
Platform 4 Min Read

Enhancements To Ingest Actions Improve Usability and Expand Searchability Wherever Your Data Lives

Along with the respective Splunk Enterprise version 9.1.0 and Splunk Cloud Version 9.0.2305 releases, Ingest Actions has launched a new set of features and capabilities that improve its usability and expand on configurability of data routed by Ingest Actions to S3.

Follow Splunk Down a Guided Path to Resilience

The Prescriptive Adoption Motions for Security and Observability offer technical expertise, best practices, and product knowledge to help you with key use cases.
Learn 5 Min Read

Cryptographically Relevant Quantum Computers (CRQCs) & The Quantum Threat

Quantum computing sounds scary (depending on your source), but you don't have to be worried! Get expert information on today's quantum threat.
Security 2 Min Read

Making Sense of the New SEC Cybersecurity Rules and What They Could Mean for Your Company

The United States Securities and Exchange Commission’s (SEC) July 26 approval of new cybersecurity 'incident' disclosure rules is top of mind for every public company, and understanding what it means and how companies will be held accountable is crucial.

ML-Powered Assistance for Adaptive Thresholding in ITSI

ML-Assisted Thresholding provides recommendations for time policies, algorithms, and thresholds for Splunk ITSI adaptive thresholding.
Learn 8 Min Read

IoT Monitoring: Protecting & Maintaining IoT Devices

Explore the evolving landscape of IoT cybersecurity. Learn why IoT security matters, benefits of IoT monitoring, and tools to safeguard your IoT ecosystem.
Learn 8 Min Read

IT Event Correlation: Software, Techniques and Benefits

"Explore the power of event correlation in IT operations. Uncover hidden insights, detect issues, and enhance efficiency through meaningful event analysis. Learn more."
Security 3 Min Read

Open Cybersecurity Schema Framework (OCSF) Takes Flight with v1.0 Schema Release

The Open Cybersecurity Schema Framework (OCSF) celebrates its first anniversary with the launch of a new open data schema.