Top 10 Cloud Certifications to Explore in 2023
Explore the evolution of cloud computing, its impact on businesses, and top certifications to boost your cloud computing career.
View ArticleDeep learning in security: text-based phishing email detection with BERT model
We introduced a large language model (LLM)-based phishing email detector integrated into the Splunk DSDL app. We provide details on model training and evaluation, comparisons to other machine learning...
View ArticleData Governance in 2023: Definition & Best Practices
Discover the importance of data governance in a data-driven world. Learn key components, benefits, and best practices for secure, high-quality data.
View ArticleData Loss Prevention (DLP): Definition, Components & Types
Explore Data Loss Prevention (DLP), a vital security solution for safeguarding sensitive information, compliance, and minimizing data breach risks.
View ArticleObservability for the Public Sector: Greater Visibility for a More Resilient...
Discover key observability insights, challenges and trends from leaders across the public sector.
View ArticleData Security Today: Threats, Techniques & Solutions
Data security is more important than ever. With organizations relying heavily on technology for their sensitive information, the risk of data breaches is constantly rising.
View ArticleThreat Hunting for Dictionary-DGA with PEAK
Explore applied model-assisted threat hunting for dictionary-based domain generation algorithms using the SURGe Security Research Team's PEAK Threat Hunting Framework.
View ArticleLexi’s Unexpected Path to Tech
Get to know Splunker Alexandra Nuttbrown, one of the co-leads of our Womxn+ Employee Resource Group which helps foster, empower and grow a diverse womxn-led community.
View ArticleCorrelation Does Not Equal Causation - Especially When It Comes to...
Observability has been tied up with causality from its origins in the mathematical realm of control theory in the early 1960s. But what precisely does the term ‘causality’ denote? In how does...
View ArticleSplunk Achieves AWS Retail Competency Status
We are excited to announce that Splunk has officially attained the coveted Amazon Web Services (AWS) Retail Competency status.
View ArticleIT Infrastructure Defined
Let's answer the question "What exactly is IT infrastructure?" We'll drill down on the different types and categories of IT infrastructure, how to manage it, as well as what the future holds.
View ArticleCloud Monitoring: What It Is & How Monitoring the Cloud Works
IT monitoring is a powerful thing! One flavor focuses solely on monitoring all your cloud workloads. Get the full details here in this comprehensive article.
View ArticleThe Common Information Model (CIM) Defined
CIM is a standard approach to represent & describe diverse system components. Read on to learn all about CIM, core concepts, and the benefits it brings to organizations.
View ArticleData Fabric Architecture: Benefits, Best Practices & Trends
Data architecture is a Big Topic for many today. Learn about the data fabric architecture, get started on your own, and consider trends that impact how we treat our data.
View ArticleMITRE ATT&CK: Your Complete Guide To The ATT&CK Framework
Threat actions are always one step ahead. Get ahead of them with the great information in MITRE ATT&CK, a go-to for all security pros. Get the full story here.
View ArticleNetwork Monitoring 101: How To Monitor Networks Effectively
Network monitoring means overseeing a network's performance, availability, and overall functionality — allowing you to identify and resolve issues before they impact end-users.
View ArticleMeet the Splunktern: Calum Kuhn
In this installment of our 'Meet the Splunktern' series, we're featuring Calum Kuhn, a Sales Engineer Intern working remotely from Texas.
View ArticleUsing metadata & tstats for Threat Hunting
Behold the power of metadata and tstats commands! These commands will quickly provide situational awareness of your hosts and sourcetypes as you begin hunting.
View ArticleUsing stats, eventstats & streamstats for Threat Hunting…Stat!
The stats command is a crucial capability when you’re threat hunting. And so are two related commands: eventstats & streamstats. Get all the details, right here.
View ArticleData Mesh Architecture Explained
Data mesh might be the solution you need. Want to enable teams to innovate, to own and drive their data? Learn all about data mesh right here.
View Article