Kushagra Sharma's Blog Posts

Kushagra Sharma is a Product Manager at Cisco working on AIOps products that help teams operate complex systems with intelligence and scale. He focuses on translating customer problems into practical, data-driven solutions at the intersection of AI, reliability, and software platforms. Passionate about clear thinking and strong product craft, Kushagra writes to share insights on technology, product strategy, and building systems that actually work in the real world.

Impact Bytes: Shoring Up Cybersecurity to Defend the Defenders
Global Impact
3 Minute Read

Impact Bytes: Shoring Up Cybersecurity to Defend the Defenders

Splunker Cheryl Timoney dives into the significant strides to protect nonprofits that the CyberPeace Institute have made over the last five years.
What Is Anomaly Detection? Examples, Techniques & Solutions
Learn
8 Minute Read

What Is Anomaly Detection? Examples, Techniques & Solutions

Interest in anomaly detection is on the rise everywhere. Anomaly detection is really about understanding our data and what we expect from "normal" behavior. Learn more here.
Splunk is Nurturing Tomorrow’s Cybersecurity Leaders Today
Security
2 Minute Read

Splunk is Nurturing Tomorrow’s Cybersecurity Leaders Today

The Splunk Academic Alliance program combines education with practical skills development to prepare the next generation of data and cybersecurity professionals.
CIS Critical Security Controls: The Complete Guide
Learn
17 Minute Read

CIS Critical Security Controls: The Complete Guide

CIS Critical Security Controls are a framework of actions that organizations can take to improve their overall security posture.
NIS2: The Network & Information Security Directive
Learn
5 Minute Read

NIS2: The Network & Information Security Directive

Learn how Network & Information Security (NIS2) regulations aim to protect your entities from cyber threats and ensure compliance with security standards.
6 Vulnerability Types You Need To Know
Learn
6 Minute Read

6 Vulnerability Types You Need To Know

Knowing where and how vulnerabilities can exist, you can start to get ahead of them. Let’s look at the six most important vulnerability types.