Kushagra Sharma's Blog Posts

Kushagra Sharma is a Product Manager at Cisco working on AIOps products that help teams operate complex systems with intelligence and scale. He focuses on translating customer problems into practical, data-driven solutions at the intersection of AI, reliability, and software platforms. Passionate about clear thinking and strong product craft, Kushagra writes to share insights on technology, product strategy, and building systems that actually work in the real world.

Leading or Lagging? Three Things That Will Move Observability for Financial Services Forward
Partners
6 Minute Read

Leading or Lagging? Three Things That Will Move Observability for Financial Services Forward

Boost IT efficiency, scale faster, and enhance customer experiences with insights from Evolutio and Splunk Observability.
Learn SPL Command Types: Efficient Search Execution Order and How to Investigate Them
Tips & Tricks
6 Minute Read

Learn SPL Command Types: Efficient Search Execution Order and How to Investigate Them

When performing searches, Splunk uses its own language, SPL (Search Processing Language). In this article, we will explain each type of SPL and show you the efficient order in which to run searches and how to use the Search Job Inspector, an investigative tool.
APAC in 2025: A Harder Look at AI, Data and Cybersecurity Standards
Leadership
4 Minute Read

APAC in 2025: A Harder Look at AI, Data and Cybersecurity Standards

Splunk's Simon Davies dives into our Splunk Predictions 2025 report and breaks down three key trends that will be pertinent to the APAC region in the year ahead.
Business Continuity vs. Business Resilience: What's The Difference?
Learn
6 Minute Read

Business Continuity vs. Business Resilience: What's The Difference?

Business resilience is a key trend this year, so let’s outline the differences between business continuity and resilience. Hint: one’s a process, one is much more.
RBAC vs. ABAC: Role-Based & Attribute-Based Access Control Compared
Learn
6 Minute Read

RBAC vs. ABAC: Role-Based & Attribute-Based Access Control Compared

Compare RBAC vs ABAC: Learn the pros, cons, and use cases of Role-Based & Attribute-Based Access Control to enhance security and simplify management.
Threat Detection, Explained
Learn
5 Minute Read

Threat Detection, Explained

Threat detection is fundamental to any cybersecurity practice. Learn what this term means and how to get started with it in this article.