Customer Experience (CX): How To Achieve CX Success Today
Understand why customer experience is the #1 goal for organizations today, including public sectors and the U.S. government.
View ArticleMaking Sense of the New SEC Cybersecurity Rules and What They Could Mean for...
The United States Securities and Exchange Commission’s (SEC) July 26 approval of new cybersecurity 'incident' disclosure rules is top of mind for every public company, and understanding what it means...
View ArticleCryptographically Relevant Quantum Computers (CRQCs) & The Quantum Threat in...
Quantum computing sounds scary (depending on your source), but you don't have to be worried! Get expert information on today's quantum threat.
View ArticleFollow Splunk Down a Guided Path to Resilience
The Prescriptive Adoption Motions for Security and Observability offer technical expertise, best practices, and product knowledge to help you with key use cases.
View ArticleEnhancements To Ingest Actions Improve Usability and Expand Searchability...
Along with the respective Splunk Enterprise version 9.1.0 and Splunk Cloud Version 9.0.2305 releases, Ingest Actions has launched a new set of features and capabilities that improve its usability and...
View ArticleExploit Kits: How They Work and How to Protect Yourself
Explore the dark world of exploit kits — automated hacking tools available on the dark web. Learn how they exploit vulnerabilities, their dangers and possible defense strategies
View ArticleWhat’s ABAC? How Attribute Based Access Control Works
Discover the power of Attribute-Based Access Control (ABAC) in managing security in different environments. Learn benefits, challenges, and implementation insights.
View ArticlePerformance Testing: Types, Tools & Best Practices
Learn the ins and outs of performance testing — from types to metrics and tools. Ensure optimal software performance and user experience with this guide.
View ArticleFrom Disruptions to Resilience: The Role of Splunk Observability in Business...
The future of observability will continue to rapidly evolve and Splunk Partners play a crucial role in helping customers build resilience and grow their business with Splunk.
View ArticleCloud Analytics 101: Uses, Benefits and Platforms
Discover the power of cloud analytics, from data consolidation to scalability and security. Learn how to choose the right platform for your business needs.
View ArticleUnveiling Splunk UBA 5.3: Power and Precision in One Package
Splunk celebrates the launch of User Behavior Analytics (UBA) 5.3, introducing the 20 Node XL cluster, innovative Splunk UBA models, and essential system and security upgrades.
View ArticleMaking It Easy To Manage Lookup Files and Backups With Lookup File Editing
The 4.0.1 release of the App for Lookup File Editing helps users mitigate issues with new features such as a backup size limit and dashboards for tracking backup size.
View ArticleIntroducing the Splunk App for Behavioral Profiling
Introducing the Splunk App for Behavioral Profiling, a collection of workflows which enable you to operationalise detection and scoring of behavioral anomalies at scale in complex environments,...
View ArticleCreating Equitable Global Health: Global Impact Partnering With Ersilia
With Splunk’s help, the Ersilia Open Source Initiative will be able to scale its work to make science accessible to all.
View ArticleWhat Is Financial Crime Risk Management (FCRM)?
Delve into Financial Crime Risk Management (FCRM). Learn types of crimes, AML compliance, risk assessment, and FCRM solutions for detection and prevention.
View ArticleBuild Engineering 101: Roles, Tools and Best Practices
Dive into Build Engineering: roles, tools, processes, and benefits. Learn how it shapes software development and streamlines deployment.
View ArticleSplunk SOAR Playbook of the Month: Investigations with Playbooks
For this month’s edition of Playbook of the Month, we’ll look at how you can perform investigations at machine speed using Splunk SOAR and one of our investigation playbooks, Internal Host WinRM...
View ArticleNetwork Configuration Today: The Ultimate Guide
Understand network configuration: what it means, why you need it, the six most common types, and tools and topics for monitoring and managing your network.
View ArticleUsing Splunk Stream for Hunting: Finding Islands in the Stream (of Data)
Let's look at how to use the popular Splunk Stream App for our favorite purpose: threat hunting! This is part of our Threat Hunting with Splunk series.
View ArticleDeveloping the Splunk App for Anomaly Detection
A technical overview of the Splunk App for Anomaly Detection, which uses machine learning to automatically configure anomaly detection jobs on time series data.
View Article