/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Data Loss Prevention (DLP): Definition, Components & Types
Learn
6 Minute Read

Data Loss Prevention (DLP): Definition, Components & Types

Explore Data Loss Prevention (DLP), a vital security solution for safeguarding sensitive information, compliance, and minimizing data breach risks.
Deep Learning in Security: Text-based Phishing Email Detection with BERT Model
Security
4 Minute Read

Deep Learning in Security: Text-based Phishing Email Detection with BERT Model

We introduced a large language model (LLM)-based phishing email detector integrated into the Splunk DSDL app. We provide details on model training and evaluation, comparisons to other machine learning and deep learning algorithms as well as deployment approaches to Splunk in this blog.
Your Self-Managed Journey to Digital Resilience
Customers & Community
2 Minute Read

Your Self-Managed Journey to Digital Resilience

No matter your industry, starting point, or organizational size, the Use Case Explorers for Security and Observability will help you improve digital resilience.
SLA vs. SLI vs. SLO: Understanding Service Levels
Learn
6 Minute Read

SLA vs. SLI vs. SLO: Understanding Service Levels

Discover the key differences between SLAs, SLOs, and SLIs in service-driven businesses. Learn best practices and overcome challenges in implementing these crucial metrics.
August 2023 Living Our Values Award Winners
Splunk Life
3 Minute Read

August 2023 Living Our Values Award Winners

Congratulations to the August 2023 'Living Our Values' award winners who truly embody Splunk's core values as a company!
The Top 3 Challenges Threatening a CISO’s Agenda
Ciso Circle
2 Minute Read

The Top 3 Challenges Threatening a CISO’s Agenda

More than 1,500 security and IT leaders weighed in about potential threats in our recent research report, The State of Security 2023. Here’s what they’re worrying about the most.
Breaking Through the Threshold: Leveling up ITSI Adaptive Thresholding with Splunk AI
Observability
3 Minute Read

Breaking Through the Threshold: Leveling up ITSI Adaptive Thresholding with Splunk AI

Learn how ML-Assisted Thresholding in Splunk ITSI can recommend the optimal adaptive threshold configurations for KPIs so you can get up and running faster.
What is Cloud Security? Types, Risks & Benefits Defined
Learn
8 Minute Read

What is Cloud Security? Types, Risks & Benefits Defined

Explore the world of cloud security! Learn about types, benefits, risks, and a 6-step framework for robust protection. Stay secure in the cloud.
Sharing is Not Caring: Hunting for Network Share Discovery
Security
9 Minute Read

Sharing is Not Caring: Hunting for Network Share Discovery

This post offers a practical guide to enhancing detection strategies against network share discovery, a technique often used by threat actors.