Kushagra Sharma's Blog Posts

Kushagra Sharma is a Product Manager at Cisco working on AIOps products that help teams operate complex systems with intelligence and scale. He focuses on translating customer problems into practical, data-driven solutions at the intersection of AI, reliability, and software platforms. Passionate about clear thinking and strong product craft, Kushagra writes to share insights on technology, product strategy, and building systems that actually work in the real world.

IT and Technology Spending & Budgets for 2025: Trends & Forecasts
Learn
12 Minute Read

IT and Technology Spending & Budgets for 2025: Trends & Forecasts

Tech & IT spending is on the rise in 2025 across the globe. Read more on investment trends and see which regions will spend the most.
What Is Network Visibility?
Learn
7 Minute Read

What Is Network Visibility?

Network visibility means seeing across the entire digital footprint to understand everything that is in and moving through your network.
Tech the Halls - Part 1
Tips & Tricks
5 Minute Read

Tech the Halls - Part 1

In this first blog, we explore how Splunk can make financial planning simpler and smarter. Whether you’re tracking your holiday expenses, identifying spending trends, or preparing for unexpected costs, Splunk equips you with the insights you need to make better financial decisions.
Ciso Q&A: Walking the Risk Tightrope to Drive Innovation
Ciso Circle
8 Minute Read

Ciso Q&A: Walking the Risk Tightrope to Drive Innovation

Understanding the evolution of threats as generative AI ups the stakes for defenders
What's Moore's Law? Its Impact in 2026
Learn
7 Minute Read

What's Moore's Law? Its Impact in 2026

Moore’s law has proved to be an accurate observation for over 50 years. Learn what Moore’s law is and why it matters today
What is Network Segmentation? A Complete Guide
Learn
8 Minute Read

What is Network Segmentation? A Complete Guide

Learn how network segmentation enhances security, boosts network performance, and protects critical assets by isolating subnets and limiting cyber threats.