Kushagra Sharma's Blog Posts

Kushagra Sharma is a Product Manager at Cisco working on AIOps products that help teams operate complex systems with intelligence and scale. He focuses on translating customer problems into practical, data-driven solutions at the intersection of AI, reliability, and software platforms. Passionate about clear thinking and strong product craft, Kushagra writes to share insights on technology, product strategy, and building systems that actually work in the real world.

How to Manage Planned Downtime the Right Way, with Synthetics
Observability
6 Minute Read

How to Manage Planned Downtime the Right Way, with Synthetics

Planned downtime management ensures clean synthetic tests and meaningful signals during environment changes. Manage downtime the right way, with synthetics.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
From Discovery to Defense: Detecting Local LLMs to Address Shadow AI
Artificial Intelligence
13 Minute Read

From Discovery to Defense: Detecting Local LLMs to Address Shadow AI

Uncover and defend against Shadow AI risks from local LLMs. Learn how Splunk detects unauthorized AI frameworks, prevents data leakage, and strengthens enterprise security.
Beyond Deepfakes: Why Digital Provenance is Critical Now
Learn
5 Minute Read

Beyond Deepfakes: Why Digital Provenance is Critical Now

Combat AI misinformation with digital provenance. Learn how this essential concept tracks digital asset lifecycles, ensuring content authenticity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.