Hemant Seth's Blog Posts
Hemant is a Principal Product Manager at Splunk, leading the Kubernetes Monitoring offering within Splunk Observability Cloud. Prior to this role, he focused on Splunk Observability Platform administration, including identity management and license usage. Hemant brings over a decade of experience in the observability domain and holds a Master’s degree in Electrical Engineering with a specialization in Telecommunications.
Display Mode
Paginated
Filter
Author
Author URL
Limit
6

The Next Big Challenge: Cloud Complexity
Cybersecurity remains an ever-growing concern in our digitized, post-pandemic world. While rapid digitization opens doors to ample benefits and business opportunities, companies also have to deal with an uptick in cyber crimes, as criminals and other threat actors raise their game, making cyber attacks more frequent and complex than ever before

What Do Organizations Value Most in a SIEM/Security Analytics Provider? In a Word: Actionability
According to 451 Research’s Voice of the Enterprise survey data, 64% say integration and correlation of threat intelligence is very important when selecting a SIEM vendor. Learn where Splunk Enterprise Security can give you actionable insights.

Pamela Fusco Joins Splunk as CISO
We're thrilled to announce that Pamela Fusco is joining Splunk as our new Chief Information Security Officer (CISO) and brings with her a rich background and experience in cybersecurity.

Do Good, Feel Good: Splunker Volunteers in Action
With five days of Volunteer Time Off (VTO) each year, Splunkers can decide on both the cause they’d like to support and how and when they’d like to volunteer - read on to learn how our team is using this time to give back.

Splunker Stories: Tony Iacobelli
In our latest edition of 'Splunker Stories,' we meet with one of Splunk’s Senior Incident Handlers, Tony Iacobelli.

Hunting for Detections in Attack Data with Machine Learning
Learn how to leverage the real-world and simulated attack data that Splunk's Threat Research team collected to use machine learning to discover attack activity and identify how to transform insights into detections.