Hemant Seth's Blog Posts

Hemant is a Principal Product Manager at Splunk, leading the Kubernetes Monitoring offering within Splunk Observability Cloud. Prior to this role, he focused on Splunk Observability Platform administration, including identity management and license usage. Hemant brings over a decade of experience in the observability domain and holds a Master’s degree in Electrical Engineering with a specialization in Telecommunications.

CISOs Are Worrying About Ransomware: Here’s What They Should Do About It
Ciso Circle
3 Minute Read

CISOs Are Worrying About Ransomware: Here’s What They Should Do About It

It's clear that ransomware is continuing to emerge and evolve as a costly thorn in the side of CEOs, CISOs and security professionals alike — here's how to move forward.
Best Practices from Leading DevOps and ITOps Teams – Recap of .conf Go EMEA
.conf & .conf Go
1 Minute Read

Best Practices from Leading DevOps and ITOps Teams – Recap of .conf Go EMEA

Take a deep dive into best practices from Leading DevOps and ITOps Teams at .conf Go EMEA.
Best Practices from Leading SecOps Teams – Recap of .conf Go EMEA
.conf & .conf Go
1 Minute Read

Best Practices from Leading SecOps Teams – Recap of .conf Go EMEA

Take a deep dive into best practices leading SecOps teams shared at .conf Go EMEA.
Resilience, from Madrid to Helsinki - .conf Go 2023 Brings the Future of Security and Observability to Europe
.conf & .conf Go
3 Minute Read

Resilience, from Madrid to Helsinki - .conf Go 2023 Brings the Future of Security and Observability to Europe

This autumn, Splunk brought .conf Go to 13 cities across Europe, offering participants practical, actionable advice and insights to overcome some of the toughest digital challenges and helping them build more digital resilience in their organisations.
The Digital Immune System (DIS) Explained
Learn
4 Minute Read

The Digital Immune System (DIS) Explained

A strategic trend per Gartner, the digital immune system is a framework for ensuring your business resilience and health. Get the full story on this concept here.
Multi-Stage Attacks & How To Detect Them
Learn
4 Minute Read

Multi-Stage Attacks & How To Detect Them

Today's cyberattacks are sophisticated: there are multiple steps to take in order to have a huge impact. Get ahead of each step with this primer on detecting multistage attacks.