The Public Sector's Worst Nightmare: Fraud
In this post, we’ll dive deeper into how much fraud affects the public sector.
View ArticleInternet Trends in 2023: Mary Meeker, Stats, Trends & Predictions
If no one documents trends, did they happen? Luckily, we don’t have to pretend! We’re covering Mary Meeker to find out what happened to her internet trends.
View ArticleWhat Is Prompt Engineering? Strategies for Creating Effective AI Inputs
Prompt engineering isn’t about speed — it’s about getting effective AI outputs that you can use in the real world. Get all the details here.
View ArticleIndustry Leaders Share Thoughts on the Cyber Talent Gap
Eric Fusilero is honored to be part of an esteemed panel of leaders who are thinking about innovative solutions to help fill the job vacancies being perpetuated by the ever-changing, data-centric...
View ArticleThe Platform Engineer Role Explained: Who Is a Platform Engineer?
Platform engineers are in demand! And for good reason. Find out how much you’ll make ($$$) and what skills you’ll need to master the Platform Engineer role.
View ArticleSplunk SOAR Playbook of the Month: Tackling Phishing Attempts with Identifier...
Learn how you can use Splunk's identifier reputation analysis playbooks to implement a workflow that will help your team automate the alert and quarantine processes for potential threats based on key...
View ArticleHypothesis-Driven Hunting with the PEAK Framework
Details on hypothesis-driven threat hunting with the PEAK framework.
View ArticlePerformance Indicators: 12 Types of KPIs & When to Use Them
Measuring business operations is critical, but are you measuring the right stuff? Check out these 12 indicator types to inform what you’re measuring.
View ArticleSecurity Content from the Splunk Threat Research Team
The blog explains how STRT develops Splunk Security Content, aiding detection engineering and threat research teams to efficiently detect and respond to potential threats, using ESCU App amidst growing...
View ArticleAPTs in 2023: Characteristics, Phases & Defending Against Advanced Persistent...
APTs pose a significant challenge to organizations and governments worldwide. Get the latest on defending against these attacks in 2023.
View ArticleBug Bounty Programs Explained: Proactively Finding Bugs for Enhanced Security
Worried you're missing hard to spot bugs? Learn how organizations leverage ethical hackers to squash bugs with bug bounty programs.
View ArticleSparking Splunker Wellbeing
Learn about how Splunk and our leaders support employee wellbeing.
View ArticleSplunk Wins 24 TrustRadius Top Rated Awards
We’re thrilled to announce that our customers are once again showing us big love! Splunk has earned twenty-four 2023 Top Rated Awards from TrustRadius.
View ArticleWhat Is SAML? SAML Authentication & Security Assertion Markup Language Explained
SSO makes authentication and authorization a breeze — SAML makes it possible. Read our crash course to learn how!
View ArticleTyposquatting 101: Types, Examples & Ways to Protect Yourself from...
When it comes to security, every detail matters. Typosquatting turns small errors into big consequences, here's what to look out for.
View ArticleSplunk Field Hashing & Masking Capabilities for Compliance
Satisfy internal and external compliance requirements using Splunk standard components.
View ArticleCyberattack Maps Explained: The Value & Limitations of Cyber Attack Maps
Cyberattack maps are powerful tools in preparing a robust cybersecurity approach, here's what to keep in mind when visualizing the latest threats.
View ArticleDatabase Management Systems (DBMS): The Beginner’s Guide
Getting started with databases? From relational, to object-orientated, here's our beginner's guide to Database Management Systems!
View ArticleProgramming Languages in 2023: The Ultimate Guide to Types, Examples &...
Looking to become a developer, but not sure where to start? We've put together the definitive guide to learning programming in 2023
View ArticleHelping Law Enforcement with Call Detail Records
This blog gives Splunker Nimish Doshi's history with CDRs at Splunk and a tip on how to correlate CDRs for catching nefarious behavior.
View Article