Hemant Seth's Blog Posts

Hemant is a Principal Product Manager at Splunk, leading the Kubernetes Monitoring offering within Splunk Observability Cloud. Prior to this role, he focused on Splunk Observability Platform administration, including identity management and license usage. Hemant brings over a decade of experience in the observability domain and holds a Master’s degree in Electrical Engineering with a specialization in Telecommunications.

Cybersecurity Threats: What They Are & How They Work Today
Learn
12 Minute Read

Cybersecurity Threats: What They Are & How They Work Today

In this article, we discuss cybersecurity threats including how they've evolved, common threats, and the best practices to deal with them.
ValleyRAT Insights: Tactics, Techniques, and Detection Methods
Security
12 Minute Read

ValleyRAT Insights: Tactics, Techniques, and Detection Methods

The Splunk Threat Research Team conducts an analysis for several variants of ValleyRAT’s malware samples to extract its MITRE ATT&CK tactics, techniques, and procedures (TTPs).
GovSummit Is Returning to the Nation’s Capital – Here Are the Top 3 Reasons You Should Attend
Industries
3 Minute Read

GovSummit Is Returning to the Nation’s Capital – Here Are the Top 3 Reasons You Should Attend

Join us at GovSummit as we demonstrate how you can deliver on the nation’s cyber strategy with Splunk.
What Is DFIR? Digital Forensics & Incident Response
Learn
6 Minute Read

What Is DFIR? Digital Forensics & Incident Response

Learn what is digital forensics & incident response (DFIR) and how it works to address cyber threats.
The Forensic Investigator Role: Skills and Responsibilities
Learn
6 Minute Read

The Forensic Investigator Role: Skills and Responsibilities

Uncover how forensic investigators interpret and assess crimes and frauds to help companies strengthen their security.
Offensive vs. Defensive Security: What's The Difference?
Learn
6 Minute Read

Offensive vs. Defensive Security: What's The Difference?

Learn the difference between offensive and defensive security, who does what and when. Then, we'll explore the challenges inherent in both.