/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Insider Threats in Cybersecurity
Learn
5 Minute Read

Insider Threats in Cybersecurity

Security anything isn't limited to outsiders. People on the inside can breach your security too. Read how in this guide to insider threats.
Observability for Sustainability
Observability
5 Minute Read

Observability for Sustainability

For the past 20 years, the various stakeholder communities that together constitute the IT industry have attempted to address sustainability. Could observability help in practicing sustainable IT and improving the carbon footprint reduction in its operations?
4 Keys to Building Better Board Relationships, According to a Board Director
Ciso Circle
2 Minute Read

4 Keys to Building Better Board Relationships, According to a Board Director

Splunk board member Elisa Steele shares how transparency, third-party assessments and the classic Lunch and Learn can help you successfully navigate board relationships.
More Than Just a RAT: Unveiling NjRAT's MBR Wiping Capabilities
Security
10 Minute Read

More Than Just a RAT: Unveiling NjRAT's MBR Wiping Capabilities

The Splunk Threat Research Team (STRT) provides a deep-dive analysis of NjRAT (or Bladabindi), a Remote Access Trojan (RAT) discovered in 2012 that's still active today.
SOARing High for M-21-31
Industries
2 Minute Read

SOARing High for M-21-31

Explore three key considerations when implementing logging orchestration, automation, and response for OMB M-21-31.
Splunk App for Data Science and Deep Learning - What’s New in Version 5.1.1
Industries
2 Minute Read

Splunk App for Data Science and Deep Learning - What’s New in Version 5.1.1

In this article, we'll dive into what's new in the recently released Splunk App for Data Science and Deep Learning (DSDL) version 5.1.1 available on Splunkbase now.
DevOps & DORA Metrics: The Complete Guide
Learn
10 Minute Read

DevOps & DORA Metrics: The Complete Guide

Choosing the right DevOps metrics isn’t easy — where to start? What’s worth measuring? We break down the best metrics, including how to use and improve them.
Detect WS_FTP Server Exploitation with Splunk Attack Range
Security
5 Minute Read

Detect WS_FTP Server Exploitation with Splunk Attack Range

The Splunk Threat Research Team shares how they used Splunk Attack Range to develop detection content related to CVE-2023-40044.
How to Craft an AI Roadmap That Everyone Can Get Behind
Cto Stack
1 Minute Read

How to Craft an AI Roadmap That Everyone Can Get Behind

The first step to building generative AI into a business strategy? Forget the hype and make sure that generative AI is the right fit.