/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Conway’s Law Explained
Learn
4 Minute Read

Conway’s Law Explained

In business, Conway's Law says: your business outcomes will be a direct reflection of your company's internal structure — good or bad. Read more here.
The Hidden Foundation of AI That Many Tech Leaders May Overlook
Ciso Circle
4 Minute Read

The Hidden Foundation of AI That Many Tech Leaders May Overlook

Leaders will miss out on the real potential of AI unless they can get a handle on one critical thing. Former CISO and Chief Digital Trust Officer Mike Towers weighs in.
CIO Roundtable: Harnessing GenAI for Resilient Security and Observability – Insights and Strategies
Security
2 Minute Read

CIO Roundtable: Harnessing GenAI for Resilient Security and Observability – Insights and Strategies

Get insights from a recent roundtable discussion in collaboration with CIO magazine. The talk focused on the dual challenge faced by IT and security managers: mitigating risks associated with AI while leveraging AI to enhance organizational capability.
Detecting Dubious Domains with Levenshtein, Shannon & URL Toolbox
Security
6 Minute Read

Detecting Dubious Domains with Levenshtein, Shannon & URL Toolbox

Got some parsed fields that you're ready to analyze... possibly for threat hunting? We'll use Levenshtein, Shannon & URL Toolbox to show you how!
Parsing Domains with URL Toolbox (Just Like House Slytherin)
Security
3 Minute Read

Parsing Domains with URL Toolbox (Just Like House Slytherin)

One of the most popular Splunk security apps of all time, URL Toolbox’s URL parsing capabilities have been leveraged by thousands. Full story here.
Take a SIP: A Refreshing Look at Subject Interface Packages
Security
10 Minute Read

Take a SIP: A Refreshing Look at Subject Interface Packages

Splunker Michael Haag dives into Subject Interface Packages (SIPs) and their role in Windows security, exploring how SIPs can be exploited by malicious actors to bypass security measures and sign malicious code.
How can Europe’s Public Sector become more digitally resilient?
Leadership
2 Minute Read

How can Europe’s Public Sector become more digitally resilient?

Challenges of a pandemic, conflict and various economic shocks have forced us all to adapt very quickly. Updating our understanding of what digital resilience is, is a critical priority to ensure that the security, reliability and certainty of service delivery is to be preserved.
Metrics to Monitor for AWS (ELB) Elastic Load Balancing
Learn
7 Minute Read

Metrics to Monitor for AWS (ELB) Elastic Load Balancing

In this blog post, we'll take a look at metrics to monitor for AWS Elastic Load Balancing.
Splunk SOAR 6.2 Introduces New Automation Features, Workload Migration, and Firewall Integrations
Security
3 Minute Read

Splunk SOAR 6.2 Introduces New Automation Features, Workload Migration, and Firewall Integrations

Announcing the release of Splunk SOAR 6.2 with features like logic loops for playbooks, integrations with CyberArk, two new firewall apps, and a new conversion option for classic playbooks.