Hemant Seth's Blog Posts

Hemant is a Principal Product Manager at Splunk, leading the Kubernetes Monitoring offering within Splunk Observability Cloud. Prior to this role, he focused on Splunk Observability Platform administration, including identity management and license usage. Hemant brings over a decade of experience in the observability domain and holds a Master’s degree in Electrical Engineering with a specialization in Telecommunications.

Impact Bytes: Shoring Up Cybersecurity to Defend the Defenders
Global Impact
3 Minute Read

Impact Bytes: Shoring Up Cybersecurity to Defend the Defenders

Splunker Cheryl Timoney dives into the significant strides to protect nonprofits that the CyberPeace Institute have made over the last five years.
What Is Anomaly Detection? Examples, Techniques & Solutions
Learn
8 Minute Read

What Is Anomaly Detection? Examples, Techniques & Solutions

Interest in anomaly detection is on the rise everywhere. Anomaly detection is really about understanding our data and what we expect from "normal" behavior. Learn more here.
Splunk is Nurturing Tomorrow’s Cybersecurity Leaders Today
Security
2 Minute Read

Splunk is Nurturing Tomorrow’s Cybersecurity Leaders Today

The Splunk Academic Alliance program combines education with practical skills development to prepare the next generation of data and cybersecurity professionals.
CIS Critical Security Controls: The Complete Guide
Learn
17 Minute Read

CIS Critical Security Controls: The Complete Guide

CIS Critical Security Controls are a framework of actions that organizations can take to improve their overall security posture.
NIS2: The Network & Information Security Directive
Learn
5 Minute Read

NIS2: The Network & Information Security Directive

Learn how Network & Information Security (NIS2) regulations aim to protect your entities from cyber threats and ensure compliance with security standards.
6 Vulnerability Types You Need To Know
Learn
6 Minute Read

6 Vulnerability Types You Need To Know

Knowing where and how vulnerabilities can exist, you can start to get ahead of them. Let’s look at the six most important vulnerability types.