Quantcast
Channel: Splunk Blogs
Browsing all 2319 articles
Browse latest View live

Data Breach Defined & Ways To Prevent One in 2024

Data breaches can happen in many ways — ransomware, phishing, accidental exposure — but one thing is clear: our data is being breached all the time.

View Article


Availability Management: The Ultimate Guide

Comprehensive article alert! Availability management has different approaches, roles & responsibilities, metrics and solutions. Get the full story here.

View Article


How to Monitor Your Hybrid Applications Without Toil

Splunk can help you conquer the complexity of your hybrid environment.

View Article

Using Amazon SageMaker to Predict Risk Scores from Splunk

Splunker Nimish Doshi covers using Amazon SageMaker and Splunk to further develop a fraud detection use case to predict future risk scores.

View Article

Multimodal AI Explained

Multimodal AI is the “next big thing” in artificial intelligence technology. What does multimodal mean, and how does it compare to AIs we've already got?

View Article


Secure AI System Development

CISA & NCSC have issued joint guidelines for developing secure AI systems. Let's understand these guidelines, so we can mitigate risk in AI development.

View Article

How To Set Up Monitoring for Your Hybrid Environment

Splunk meets the demands of today to deliver comprehensive observability in hybrid environments.

View Article

Splunktern Spotlight: Izabela Golec

Meet Izabela Golec, a Software Development Intern based in our Krakow, Poland office. She shares her experience at Splunk, tips for prospective interns at Splunk and her advise for females considering...

View Article


Data Architecture for Business Data & AI Projects

Data architecture determines how you can use your data. Read on to learn how to choose data storage, data pipeline and data management strategies.

View Article


Security Testing for Mobile Applications in 2024

The security of mobile apps is a critical point in your security posture. Get the full story on why and HOW to test the security of your mobile apps.

View Article

The National Cyber Workforce & Education Strategy (NCWES) Explained

Learn about the National Cyber Workforce & Education Strategy, a U.S. program for shaping the future of cybersecurity by promoting cybersecurity education.

View Article

Ransomware & Extortionware in 2024: Stats & Trends

Ransomware is among the worst threats you face. Even worse? Ransomware keeps changing how it attacks. Get the latest ransomware trends & stats here.

View Article

What Is Hacktivism?

Hacktivism — hacking with the purpose of activism — is on the rise globally. Get the full story on what it means and how it differs from real social activism here.

View Article


Empowering the Global Workforce: The Splunk Authorized Learning Partner Program

The Splunk Authorized Learning Partner (ALP) Program is committed to scaling and expanding the education and adoption of Splunk to customers, partners, and Splunkers by building a community of...

View Article

Observability and Telecommunications Network Management [Part 1]

When considering the management of telecommunications networks, it might make sense to directly consider the observable data streams available to the practitioner instead of a model-based approach....

View Article


RUM Session Replay Or How "Watching Videos" Will Help Us With Digital...

Using the Session Replay function with Splunk Real User Monitoring offers valuable benefits to understand and improve the user experience more quickly.

View Article

Incident Response Plans: The Complete Guide To Creating & Maintaining IRPs

Need to update your incident response plan? Start here! We’ll show how to create one that works, and how to maintain it for the long haul so it stays effective.

View Article


SplunkTalk: The Podcast

The home for SplunkTalk, the podcast that's all Splunk and no junk! Get the full story from Burch and Hal here.

View Article

Enter The Gates: An Analysis of the DarkGate AutoIt Loader

The Splunk Threat Research Team (STRT) provides a deep dive analysis of the DarkGate malware and its use of AutoIt.

View Article

Defining & Improving Your Security Posture

What is your security posture? The result of all your security strategies, processes and practices. Get the total low-down on evaluating & improving yours.

View Article
Browsing all 2319 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>