/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Chief Digital Officer Role: Responsibilities, Skills and Salary Expectations
Learn
5 Minute Read

Chief Digital Officer Role: Responsibilities, Skills and Salary Expectations

In this blog post, we'll take a look at the role and responsibilities of the Chief Digital Officer.
CISOs in the Hot Seat: On Managing Liability
Ciso Circle
4 Minute Read

CISOs in the Hot Seat: On Managing Liability

A year after Uber’s former CISO was convicted of federal charges for mishandling a data breach, how are CISOs thinking about their legal responsibilities, and what can they do to manage liability?
The Largest Recent Cyberattacks
Learn
4 Minute Read

The Largest Recent Cyberattacks

Cyberattacks are always a risk, but which ones do you really need to be prepared for? Find out how the largest attacks happened this year.
Multicloud Monitoring & 7 Must-Have Capabilities
Learn
6 Minute Read

Multicloud Monitoring & 7 Must-Have Capabilities

Not all monitoring will cover all your workloads: multicloud monitoring has 7 core capabilitities. Without these, you're lacking the visibility you need.
Real-Time Analytics: Definition, Examples & Challenges
Learn
5 Minute Read

Real-Time Analytics: Definition, Examples & Challenges

Real time analytics is data analytics, with speed! Analytics in real time isn't for everything, but it's perfect for certain areas. Get the full & fast story here.
Monitor and optimize your modern, AI-powered applications with Cisco AppDynamics
Observability
3 Minute Read

Monitor and optimize your modern, AI-powered applications with Cisco AppDynamics

Learn how Cisco AppDynamics OpenAI API monitoring provides comprehensive insights that enable application owners and operations to optimize cost and monitor performance of OpenAI integrations.
How CISOs Are (and Aren’t) Using Generative AI
Ciso Circle
4 Minute Read

How CISOs Are (and Aren’t) Using Generative AI

Here are the top ways CISOs are using — or plan to use — generative AI in their security systems, based on survey responses from hundreds of CISOs and security leaders.
ISMS: Information Security Management Systems Explained
Learn
4 Minute Read

ISMS: Information Security Management Systems Explained

Learn how to establish a systematic way to manage information security. This is called the Information Security Management System (ISMS).
ISACs: Information Sharing & Analysis Centers
Learn
6 Minute Read

ISACs: Information Sharing & Analysis Centers

ISACs provide a way for organizations to collaborate on threat intelligence, so they can form better cybersecurity offensive & defensive strategies.