/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

CosmicSting: A Critical XXE Vulnerability in Adobe Commerce and Magento (CVE-2024-34102)
Security
10 Minute Read

CosmicSting: A Critical XXE Vulnerability in Adobe Commerce and Magento (CVE-2024-34102)

The Splunk Research Team dissects the technical intricacies of the CosmicSting vulnerability, explores its potential impact on affected systems, and provides detection opportunities and mitigation strategies.
Tech the Halls - Part 1
Tips & Tricks
5 Minute Read

Tech the Halls - Part 1

In this first blog, we explore how Splunk can make financial planning simpler and smarter. Whether you’re tracking your holiday expenses, identifying spending trends, or preparing for unexpected costs, Splunk equips you with the insights you need to make better financial decisions.
Cracking Braodo Stealer: Analyzing Python Malware and Its Obfuscated Loader
Security
10 Minute Read

Cracking Braodo Stealer: Analyzing Python Malware and Its Obfuscated Loader

The Splunk Threat Research Team break down Braodo Stealer's loader mechanisms, obfuscation strategies, and payload behavior.
Ensuring Downtime Is Low When the Stakes Are High During Black Friday
Cto Stack
3 Minute Read

Ensuring Downtime Is Low When the Stakes Are High During Black Friday

How to minimize IT challenges and delight customers during user surges
Splunk’s Path Towards Achieving FedRAMP Moderate Authorization for Splunk Observability
Industries
5 Minute Read

Splunk’s Path Towards Achieving FedRAMP Moderate Authorization for Splunk Observability

Splunk VP of Public Sector Bill Rowan shares how we plan on actively pursuing a FedRAMP Moderate authorized Splunk Observability Cloud offering.
AppSec Today: Application Security Requirements & Guidelines To Know
Learn
12 Minute Read

AppSec Today: Application Security Requirements & Guidelines To Know

Explore the essential aspects of application security: threats, requirements, and best practices. Learn how to safeguard your applications and data effectively.
Recovery Point Objective (RPO) vs. Recovery Time Objective (RTO): What’s The Difference?
Learn
4 Minute Read

Recovery Point Objective (RPO) vs. Recovery Time Objective (RTO): What’s The Difference?

For online services and products, availability is the name of the game. Learn what RPO and RTO mean for availability — and how to set them for your organization.
Splunk Now Generally Available on Microsoft Azure
Partners
2 Minute Read

Splunk Now Generally Available on Microsoft Azure

Splunk arrives on Microsoft Azure, giving the vast majority of Fortune 2000 companies an easier way to enable enterprise-grade security and observability.
Paving the Way for Unified Cybersecurity: OCSF Joins the Linux Foundation with Splunk’s Support
Security
4 Minute Read

Paving the Way for Unified Cybersecurity: OCSF Joins the Linux Foundation with Splunk’s Support

Unified cybersecurity takes a step forward as OCSF joins the Linux Foundation, backed by Splunk’s support.