/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Structured, Unstructured & Semi-Structured Data
Learn
6 Minute Read

Structured, Unstructured & Semi-Structured Data

An effective data management strategy is focused on the security, and transparency of structured, unstructured, and semi-structured data.
Vulnerabilities, Threats & Risk Explained
Learn
6 Minute Read

Vulnerabilities, Threats & Risk Explained

Vulnerability, threat, risk: These terms are frequently used together, but they do explain three separate components of cybersecurity?
AcidPour Wiper Malware: Threat Analysis and Detections
Security
6 Minute Read

AcidPour Wiper Malware: Threat Analysis and Detections

The Splunk Threat Research Team provides an analysis of AcidPour and how to use Splunk’s out-of-the-box security content to help defend against this wiper malware.