/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

HTTP Strict Transport Security (HSTS): Enforcing HTTPS to Prevent Web Attacks
Learn
6 Minute Read

HTTP Strict Transport Security (HSTS): Enforcing HTTPS to Prevent Web Attacks

Learn about HTTP Strict Transport Security (HSTS) for secure web communication, mitigating threats, and its limitations.
Anthropic Report Contrasts AI Fears to New AI Efficiencies
Ciso Circle
6 Minute Read

Anthropic Report Contrasts AI Fears to New AI Efficiencies

AI is accelerating cyber threats, enabling attackers to scale known techniques faster. Learn what executives need to know—and how to prepare now.
Splunk Mobile: Your Brand-New Home Screen
Platform
3 Minute Read

Splunk Mobile: Your Brand-New Home Screen

Discover Splunk Mobile’s brand-new Home Screen—personalize your view, access key metrics instantly, and take your data insights anywhere.
Announcing Splunk Enterprise 10.2 & Splunk Cloud Platform 10.2 – Next Generation Querying & Analytics
Platform
5 Minute Read

Announcing Splunk Enterprise 10.2 & Splunk Cloud Platform 10.2 – Next Generation Querying & Analytics

We're thrilled to unveil Splunk Enterprise 10.2 and Splunk Cloud Platform 10.2, raising the bar for unified data access, security, and actionable insights.
Introducing SPL2: The Next-Generation Search & Data Preparation Language for Splunk
Platform
5 Minute Read

Introducing SPL2: The Next-Generation Search & Data Preparation Language for Splunk

Announcing the worldwide availability of Search Processing Language version 2 (SPL2), the next evolution of our powerful SPL language for data search and preparation, now in Splunk Enterprise and Splunk Cloud Platform.
Cybersecurity Attacks Explained: How They Work & What’s Coming Next in 2026
Learn
4 Minute Read

Cybersecurity Attacks Explained: How They Work & What’s Coming Next in 2026

Today’s cyberattacks are more targeted, AI-driven, and harder to detect. Learn how modern attacks work, key attack types, and what security teams should expect in 2026.
Exploit Prediction Scoring System (EPSS): How It Works and Why It Matters
Learn
5 Minute Read

Exploit Prediction Scoring System (EPSS): How It Works and Why It Matters

Discover how the Exploit Prediction Scoring System (EPSS) predicts the likelihood of vulnerability exploitation, improves prioritization, and differs from CVSS.
Strong Data Governance, Stronger AI Results
Ciso Circle
8 Minute Read

Strong Data Governance, Stronger AI Results

Align governance and culture to break down silos and scale AI responsibly for smarter, more connected organizations.
Defending Against npm Supply Chain Attacks: A Practical Guide to Detection, Emulation, and Analysis
Security
18 Minute Read

Defending Against npm Supply Chain Attacks: A Practical Guide to Detection, Emulation, and Analysis

Protect your software supply chain from npm attacks. Learn to use Package-Inferno and npm-threat-emulation for deep analysis and detection with Splunk SPL.