Skip to main content
false

Chrissy Kidd

Chrissy Kidd is a technology writer, editor, and speaker based in Baltimore. The managing editor for Splunk Learn, Chrissy has covered a variety of tech topics, including ITSM & ITOps, software development, sustainable technology, and cybersecurity. Previous work includes BMC Software, Johns Hopkins Bloomberg School of Public Health, and several start-ups. She's particularly interested in how tech intersects with our daily lives. 

Learn 14 Min Read

What Is Incident Response?

In this post, we'll cover what incident response is and why it's essential for organizations to protect themselves from digital threats.
Learn 14 Min Read

What Is Root Cause Analysis? The Complete RCA Guide

In this article, we'll explore how to conduct RCA, its core principles, best practices, and the tools available to facilitate this process.
Learn 11 Min Read

Encryption Methods & Types: A Beginner’s Guide To Data Encryption

In this article, we'll discuss data encryption methods including symmetric and asymmetric encryption, common algorithms, and best practices.
Learn 6 Min Read

What Is Multimodal AI? A Complete Introduction

This article explains what Multimodal AI is and examines how it works, its benefits, and its challenges.
Learn 6 Min Read

6 Vulnerability Types You Need To Know

Knowing where and how vulnerabilities can exist, you can start to get ahead of them. Let’s look at the six most important vulnerability types.
Learn 8 Min Read

Cybersecurity Frameworks: What They Are & How to Use Them

In this post, we'll cover what a security framework is, why organizations need them, and how organizations can benefit from them.
Learn 8 Min Read

Data Quality & Data Quality Management (DQM)

In the data age, you must ensure your data is quality data. Learn what that means, and how to achieve it with data quality management.
Learn 8 Min Read

What's GRC? Governance, Risk & Compliance Explained

GRC ensures organizations meet third-party requirements while still hitting high-performance goals. Learn what it is and how to implement it.
Learn 10 Min Read

Cyber Kill Chains: Strategies & Tactics

A cyber kill chain framework helps you understand and combat attacks. Learn about the evolution and applications of the cyber kill chain.
Learn 6 Min Read

What's a Firewall? The Complete Guide

Learn about firewalls, including how it works, and the popular types of firewalls. Also, check out some of the best practices for choosing firewalls.
Learn 7 Min Read

What Are Social Engineering Attacks? A Detailed Explanation

In this post, we'll explore how cybercriminals use a variety of tactics and understand how to defend against social engineering attacks.
Learn 6 Min Read

Vulnerabilities, Threats & Risk Explained

Vulnerability, threat, risk: These terms are frequently used together, but they do explain three separate components of cybersecurity?
Learn 6 Min Read

What Is Load Balancing?

Load Balancing is the process of distributing network traffic among available servers, with the objective of optimizing certain network operations.
Learn 5 Min Read

What Are Feedback Loops?

Today, feedback loops are commonplace in IT, business, and plenty of other domains, too. But what exactly are they meant to do — and how do they work?
Learn 5 Min Read

Failure Metrics & KPIs for IT Systems

Failure metrics: a terrible name for a set of very useful metrics. If you're involved in uptime & reliability for IT systems, then read on to learn all about MTTR, MTBF, failure rates and more!
Learn 7 Min Read

Internet Trends in 2024: Mary Meeker, Stats, & Predictions

If no one documents trends, did they happen? Luckily, we don’t have to pretend! We’re covering Mary Meeker to find out what happened to her internet trends.
.conf & .conf Go 3 Min Read

.conf24 Global Broadcast: The Complete Guide

Curious about the .conf Global Broadcast from Splunk? Check out this article for all the details, answers, and excitement about what to expect.
Learn 4 Min Read

What Is Splunk & What Does It Do? A Splunk Intro

Though Splunk’s been around for 20 years (!!), we get a lot of questions like “What do you do?” and "What does your name mean?" Find out about Splunk – straight from Splunk.
Learn 7 Min Read

Data & Database Normalization Explained: How To Normalize Data

Learn about the process of data normalization, including the different types of data normal forms, the benefits of normalized data for your business and more.
Learn 5 Min Read

Network Traffic & Network Congestion: The Complete Guide

Network traffic is critical for businesses today. Read on to learn how network traffic works, and how to stop traffic congestion.
Learn 2 Min Read

Splunk Podcasts

Wondering if Splunk has any podcasts? The answer is YES! In this article, you can see all the podcasts that Splunk has published over the years.