Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Splunk report: Agentic AI takes centre stage in CISOs' path to digital resilience

Nearly all CISOs report they are now responsible for AI governance and risk management, cite the growing sophistication of threat actor capabilities as their greatest risk. Vast majority say AI enables more security events to be reviewed.
Featured Post

The new-age SOC analyst in 2026: tier 1.5

The role of the tier 1 SOC analyst has always been critical. It's the function responsible for holding the line day-to-day and responding when incidents happen. It's also the training ground for analysts, training them in a wide range of basics to prepare them to advance to tier 2. It's a role that has never been static but with the pace of change noticeably faster than ever before, the role of the tier 1 SOC analyst is evolving once again.

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Let’s face it: humans are creatures of habit, and nothing rattles us quite like the prospect of change. (Just ask anyone who’s dared to swap out the office coffee brand—revolutions have started over less.) According to SHRM's research on change fatigue, today’s relentless pace of disruption is exhausting employees faster than a budget ergonomic chair. But here’s where it gets fascinating—where security, HR, and fraud analysis converge in ways you might not expect.

Hashing in Cryptography Explained: How It Works, Algorithms, and Real-World Uses

Hashing takes your data (like a password or file) and converts it into a fixed-length code that can’t be reversed. This makes it nearly impossible for attackers to figure out what the original data was, even if they steal the hash. In this article, I’ll explain hashing in detail, including its working principles, applications, the algorithms behind it, and how to apply it correctly.

Zero-shot Security Classification with Foundation-Sec-8B and Splunk DSDL

Earlier this year, we showcased how the Foundation-Sec-8B model’s chat capabilities can be leveraged within the Splunk App for Data Science and Deep Learning (DSDL) to summarize security events and provide detection suggestions. Building on its robust security expertise, Foundation-Sec-8B also supports zero-shot classification for a wide range of security tasks.

Why Veterans Are Cybersecurity's Secret Weapon

Veterans in cybersecurity are just built different. They show up like a well-timed patch, quietly, decisively, and with an instinct for risk you can't fake. When you've owned mission-critical systems where the blast radius of a mistake is measured in lives, not log lines, you develop a rare sixth sense for risk that you simply can't teach in a bootcamp.

Digital Resilience for State and Local Governments (Part Two)

In the first part of our series, we examined the challenges facing state and local governments as they work to secure and maintain the availability of increasingly complex digital systems. Today, we turn our focus to how collaboration—powered by shared data platforms like Splunk—can enhance incident response and overall digital resilience.

Splunk Ranked Number 1 in the 2025 Gartner Critical Capabilities for Security Information and Event Management Use Cases

In addition to Splunk’s recognition as an 11-time Leader in the 2025 Gartner Magic Quadrant for Security Information and Event Management (SIEM), we are honored to announce that Splunk has been ranked as the SIEM solution in all three Use Cases for the second consecutive time in the 2025 Gartner Critical Capabilities for Security Information and Event Management report.

Static Code Analysis: The Complete Guide to Getting Started with SCA

Static code analysis wasn’t always built into the development process. That means most bugs were detected during testing, after the code was already merged and deployed. By that point, fixing issues was time-consuming, expensive, and risky. Small mistakes slipped into production. Security gaps widened and quality suffered. Static analysis shifts all of that left by bringing security and quality checks into the earliest stages of development.

Build the SOC of the Future with Splunk and Cisco

I’m not one to blog, but speaking with clients, peers, and colleagues, I often hear statements like “SIEM is dead” or “this is the SOC of the future.” So what do they really mean? Honestly, I’m not entirely sure either — there are so many conflicting viewpoints and ways of addressing this.