Software Liability Explained
Software liability is the legal responsibility of software development companies on issues related to the software they develop. Get all the details here.
View ArticleSplunk Edge Processor and Federated Search: Do I Need It?
Splunk Edge Processor and Federated Search for Amazon S3 can help efficiently gain value out of your data.
View ArticleSOC Models: In-House, Out-Sourced, or Hybrid SOC?
Splunk's Kirsty Paine shares best practices from a roundtable held at Gartner Security & Risk Management Summit 2023.
View ArticleBringing It Together: How Fusion Centers Drive Financial Services Resilience
To address ongoing challenges in financial services, SecOps, ITOps, and engineering teams are turning to Fusion Centers to help tackle rising cybercrime and become more resilient in the face of more...
View ArticleData Privacy: The Ultimate Guide
Data privacy awareness is on the rise, and that can mean big changes for business. Understand what data privacy might mean for you.
View ArticleThe Twofish Encryption Algorithm
Twofish is not vulnerable to a simple brute force attack, but is it the right choice for you? Get the full story here.
View ArticleUpdated Baseline Creation and Dashboards in OT Security Add-on for Splunk...
Version 2.3 of the OT Security Add-on for Splunk is here and it delivers three main updates.
View ArticleCyber-Physical Systems (CPS) Explained
Cyber-physical systems, CPS: the applications of cyber physical systems are almost boundless. Get the full story here.
View ArticleLog Management: Introduction & Best Practices
Log management, a building block for observability, is a crucial IT practice. Understand the concepts, goals and best practices — including a simple tutorial.
View ArticleNetwork Latency & How To Improve Latency
Latency is the delay that happens in computer networking. It's not easy to control, but there are ways to improve it. Get the full story here.
View ArticleDeploy, Test, Monitor: Mastering Microsoft Defender ASR with Atomic...
Explore Microsoft Defender ASR's role in cybersecurity with Splunk and learn deployment, testing, and monitoring strategies for robust defense.
View ArticleOld School vs. New School
The Splunk SURGe team examines the claim that generative AI will empower threat actors to improve the scale and/or efficiency of their spear-phishing campaigns.
View ArticleSplunktern Spotlight: Serra Ozarslan
Meet Serra Ozarslan, an EMEA Sales Intern based in London. She shares her experience at Splunk, tips for prospective interns at Splunk and her advise for females considering a career in tech.
View ArticleWhat Is Splunk & What Does It Do? A Splunk Intro
Though Splunk’s been around for 20 years (!!), we get a lot of questions like “What do you do?” and "What does your name mean?" Find out about Splunk – straight from Splunk.
View Article3 Steps to Greater Resilience for Communications and Media
Discover three ways Communication and Media businesses can lay a foundation of digital resiliency that sets them up for future success.
View ArticleSplunk Enterprise Security 7.3 Delivers a Refined Analyst Experience and...
Announcing Splunk Enterprise Security 7.3, delivering a refined analyst experience and enhanced risk context for seamless incident triage.
View ArticleIntroducing Our New SOAR Integrations: Why Panorama and FortiManager Users...
The Splunk SOAR team shares more on the latest firewall management apps introduced in Splunk SOAR 6.2.
View ArticleShowcasing Women in Tech with Lucy Elliott
Looking back on her Instagram takeover to increase visibility of women in tech.
View ArticleSSL/TLS Web Security Certificates & Protocols
SSL has evolved into the highly advanced TLS protocol that protects all kinds of information transmitted over the web. Read the full story here.
View ArticleHow AI Can Catalyze Digital Resilience: An Introduction to Splunk’s Philosophy
Splunker Hao Yang shares the inside scoop on how we're thinking about AI here at Splunk.
View Article