Quantcast
Channel: Splunk Blogs
Browsing all 2319 articles
Browse latest View live

Top 10 Cloud Certifications to Explore in 2023

Explore the evolution of cloud computing, its impact on businesses, and top certifications to boost your cloud computing career.

View Article


Deep learning in security: text-based phishing email detection with BERT model

We introduced a large language model (LLM)-based phishing email detector integrated into the Splunk DSDL app. We provide details on model training and evaluation, comparisons to other machine learning...

View Article


Data Governance in 2023: Definition & Best Practices

Discover the importance of data governance in a data-driven world. Learn key components, benefits, and best practices for secure, high-quality data.

View Article

Data Loss Prevention (DLP): Definition, Components & Types

Explore Data Loss Prevention (DLP), a vital security solution for safeguarding sensitive information, compliance, and minimizing data breach risks.

View Article

Observability for the Public Sector: Greater Visibility for a More Resilient...

Discover key observability insights, challenges and trends from leaders across the public sector.

View Article


Data Security Today: Threats, Techniques & Solutions

Data security is more important than ever. With organizations relying heavily on technology for their sensitive information, the risk of data breaches is constantly rising.

View Article

Threat Hunting for Dictionary-DGA with PEAK

Explore applied model-assisted threat hunting for dictionary-based domain generation algorithms using the SURGe Security Research Team's PEAK Threat Hunting Framework.

View Article

Lexi’s Unexpected Path to Tech

Get to know Splunker Alexandra Nuttbrown, one of the co-leads of our Womxn+ Employee Resource Group which helps foster, empower and grow a diverse womxn-led community.

View Article


Correlation Does Not Equal Causation - Especially When It Comes to...

Observability has been tied up with causality from its origins in the mathematical realm of control theory in the early 1960s. But what precisely does the term ‘causality’ denote? In how does...

View Article


Splunk Achieves AWS Retail Competency Status

We are excited to announce that Splunk has officially attained the coveted Amazon Web Services (AWS) Retail Competency status.

View Article

IT Infrastructure Defined

Let's answer the question "What exactly is IT infrastructure?" We'll drill down on the different types and categories of IT infrastructure, how to manage it, as well as what the future holds.

View Article

Cloud Monitoring: What It Is & How Monitoring the Cloud Works

IT monitoring is a powerful thing! One flavor focuses solely on monitoring all your cloud workloads. Get the full details here in this comprehensive article.

View Article

The Common Information Model (CIM) Defined

CIM is a standard approach to represent & describe diverse system components. Read on to learn all about CIM, core concepts, and the benefits it brings to organizations.

View Article


Data Fabric Architecture: Benefits, Best Practices & Trends

Data architecture is a Big Topic for many today. Learn about the data fabric architecture, get started on your own, and consider trends that impact how we treat our data.

View Article

MITRE ATT&CK: Your Complete Guide To The ATT&CK Framework

Threat actions are always one step ahead. Get ahead of them with the great information in MITRE ATT&CK, a go-to for all security pros. Get the full story here.

View Article


Network Monitoring 101: How To Monitor Networks Effectively

Network monitoring means overseeing a network's performance, availability, and overall functionality — allowing you to identify and resolve issues before they impact end-users.

View Article

Meet the Splunktern: Calum Kuhn

In this installment of our 'Meet the Splunktern' series, we're featuring Calum Kuhn, a Sales Engineer Intern working remotely from Texas.

View Article


Using metadata & tstats for Threat Hunting

Behold the power of metadata and tstats commands! These commands will quickly provide situational awareness of your hosts and sourcetypes as you begin hunting.

View Article

Using stats, eventstats & streamstats for Threat Hunting…Stat!

The stats command is a crucial capability when you’re threat hunting. And so are two related commands: eventstats & streamstats. Get all the details, right here.

View Article

Data Mesh Architecture Explained

Data mesh might be the solution you need. Want to enable teams to innovate, to own and drive their data? Learn all about data mesh right here.

View Article
Browsing all 2319 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>