Kushagra Sharma's Blog Posts

Kushagra Sharma is a Product Manager at Cisco working on AIOps products that help teams operate complex systems with intelligence and scale. He focuses on translating customer problems into practical, data-driven solutions at the intersection of AI, reliability, and software platforms. Passionate about clear thinking and strong product craft, Kushagra writes to share insights on technology, product strategy, and building systems that actually work in the real world.

What’s OSINT? Open-Source Intelligence Explained
Learn
8 Minute Read

What’s OSINT? Open-Source Intelligence Explained

Open-source intelligence (OSINT) is the term for collecting and analyzing publicly available data to generate actionable intelligence. Get the full story on OSINT here.
What Is Threat Analysis?
Learn
5 Minute Read

What Is Threat Analysis?

A threat analysis helps organizations discover what security risks they need to be protected from. Learn all about threat analysis here.
Achieving Cyber Resilience Has Never Been More Important - Here’s Why
Partners
3 Minute Read

Achieving Cyber Resilience Has Never Been More Important - Here’s Why

Building a SecOps strategy to improve cyber resilience is not just a security framework for organizations – it's essential to get ahead of issues and prevent downtime from causing chaos.
Comprehensive, Continuous, and Compliant: Obtain Proactive Insights with Splunk Asset and Risk Intelligence
Security
3 Minute Read

Comprehensive, Continuous, and Compliant: Obtain Proactive Insights with Splunk Asset and Risk Intelligence

Announcing the release of the latest addition to our security product portfolio, Splunk Asset and Risk Intelligence.
Fortify Digital Resilience with Splunk + Cisco Talos Incident Response
Security
3 Minute Read

Fortify Digital Resilience with Splunk + Cisco Talos Incident Response

Announcing the availability of Cisco Talos Incident Response services to Splunk customers.
What Are Social Engineering Attacks? A Detailed Explanation
Learn
7 Minute Read

What Are Social Engineering Attacks? A Detailed Explanation

In this post, we'll explore how cybercriminals use a variety of tactics and understand how to defend against social engineering attacks.