9
I Use This!
Activity Not Available

News

Posted over 2 years ago
Leverage OpenTelemetry for Jenkins in Splunk Observability and monitor CI/CD performance.
Posted over 2 years ago
In this next installment of our “Meet the Splunktern'' series, we’re featuring John Paul Francisco, our Software Engineer Intern. John is currently a senior at the University of British Columbia. Recently, John was named Splunktern of the Month! Read on to learn more about John and his journey at Splunk.
Posted over 2 years ago
Splunk AR is better than ever! In this blog post, we’ll talk about these updates and go in detail about the exciting features in Splunk AR 4.0 and Splunk App for AR 2.0.
Posted over 2 years ago
This blog kicks off a series where we talk about the entire Splunk UI Toolkit and how each part will benefit your app development process in the future.
Posted over 2 years ago
Automate and simplify finding detections against ATT&CK techniques used by adversaries with Splunk SURGe's open-sourced project, ATT&CK Detections Collector (ADA).
Posted over 2 years ago
In this installment of our 'Meet the Splunktern' series, get to know Het Kataria, one of our Software Engineer interns on the Mission Control Extension Frameworks team.
Posted over 2 years ago
Welcome to the Splunk staff picks blog. Each month, Splunk security experts curate a list of presentations, white papers, and customer case studies that we feel are worth a read.
Posted over 2 years ago
Splunk's Chief Strategy Officer, Ammar Maraqa, shares his highlights from The Information's 'Lessons Learned from Cloud Transformation' digital summit.
Posted over 2 years ago
In the latest edition of our "Splunker Stories" series, we meet our Talent Acquisition Diversity, Equity and Inclusion Program Lead, Kenny Coleman. We sat down with Kenny to discuss the path which led him to Splunk, his passion to make a difference in the world, and how he always looks for creative solutions to help marginalized individuals.
Posted over 2 years ago
Splunk Threat Research Team simulated the Log4j vulnerabilities in the Splunk Attack Range. Using the data collected, we developed 13 new detections and 9 playbooks to help Splunk SOAR customers investigate and respond to this threat.