Data Breach Defined & Ways To Prevent One in 2024
Data breaches can happen in many ways — ransomware, phishing, accidental exposure — but one thing is clear: our data is being breached all the time.
View ArticleAvailability Management: The Ultimate Guide
Comprehensive article alert! Availability management has different approaches, roles & responsibilities, metrics and solutions. Get the full story here.
View ArticleHow to Monitor Your Hybrid Applications Without Toil
Splunk can help you conquer the complexity of your hybrid environment.
View ArticleUsing Amazon SageMaker to Predict Risk Scores from Splunk
Splunker Nimish Doshi covers using Amazon SageMaker and Splunk to further develop a fraud detection use case to predict future risk scores.
View ArticleMultimodal AI Explained
Multimodal AI is the “next big thing” in artificial intelligence technology. What does multimodal mean, and how does it compare to AIs we've already got?
View ArticleSecure AI System Development
CISA & NCSC have issued joint guidelines for developing secure AI systems. Let's understand these guidelines, so we can mitigate risk in AI development.
View ArticleHow To Set Up Monitoring for Your Hybrid Environment
Splunk meets the demands of today to deliver comprehensive observability in hybrid environments.
View ArticleSplunktern Spotlight: Izabela Golec
Meet Izabela Golec, a Software Development Intern based in our Krakow, Poland office. She shares her experience at Splunk, tips for prospective interns at Splunk and her advise for females considering...
View ArticleData Architecture for Business Data & AI Projects
Data architecture determines how you can use your data. Read on to learn how to choose data storage, data pipeline and data management strategies.
View ArticleSecurity Testing for Mobile Applications in 2024
The security of mobile apps is a critical point in your security posture. Get the full story on why and HOW to test the security of your mobile apps.
View ArticleThe National Cyber Workforce & Education Strategy (NCWES) Explained
Learn about the National Cyber Workforce & Education Strategy, a U.S. program for shaping the future of cybersecurity by promoting cybersecurity education.
View ArticleRansomware & Extortionware in 2024: Stats & Trends
Ransomware is among the worst threats you face. Even worse? Ransomware keeps changing how it attacks. Get the latest ransomware trends & stats here.
View ArticleWhat Is Hacktivism?
Hacktivism — hacking with the purpose of activism — is on the rise globally. Get the full story on what it means and how it differs from real social activism here.
View ArticleEmpowering the Global Workforce: The Splunk Authorized Learning Partner Program
The Splunk Authorized Learning Partner (ALP) Program is committed to scaling and expanding the education and adoption of Splunk to customers, partners, and Splunkers by building a community of...
View ArticleObservability and Telecommunications Network Management [Part 1]
When considering the management of telecommunications networks, it might make sense to directly consider the observable data streams available to the practitioner instead of a model-based approach....
View ArticleRUM Session Replay Or How "Watching Videos" Will Help Us With Digital...
Using the Session Replay function with Splunk Real User Monitoring offers valuable benefits to understand and improve the user experience more quickly.
View ArticleIncident Response Plans: The Complete Guide To Creating & Maintaining IRPs
Need to update your incident response plan? Start here! We’ll show how to create one that works, and how to maintain it for the long haul so it stays effective.
View ArticleSplunkTalk: The Podcast
The home for SplunkTalk, the podcast that's all Splunk and no junk! Get the full story from Burch and Hal here.
View ArticleEnter The Gates: An Analysis of the DarkGate AutoIt Loader
The Splunk Threat Research Team (STRT) provides a deep dive analysis of the DarkGate malware and its use of AutoIt.
View ArticleDefining & Improving Your Security Posture
What is your security posture? The result of all your security strategies, processes and practices. Get the total low-down on evaluating & improving yours.
View Article