/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Detecting Suspicious ESXi Activity Before Ransomware Happens
Security
11 Minute Read

Detecting Suspicious ESXi Activity Before Ransomware Happens

Learn to detect suspicious activity using Splunk, including log ingestion, common indicators, and comprehensive detection strategies for VMware ESXi environments.
Picture Paints a Thousand Codes: Dissecting Image-Based Steganography in a .NET (Quasar) RAT Loader
Security
13 Minute Read

Picture Paints a Thousand Codes: Dissecting Image-Based Steganography in a .NET (Quasar) RAT Loader

Uncover how to identify malicious executable loaders that use steganography to deliver payloads such as Quasar RAT.
Using RAG, Splunk ES Content Update App (ESCU), and MLTK to Develop, Enhance, and Analyze Splunk Detections
Artificial Intelligence
5 Minute Read

Using RAG, Splunk ES Content Update App (ESCU), and MLTK to Develop, Enhance, and Analyze Splunk Detections

Learn how to enhance Splunk security detections using a local Llama3 LLM, RAG, MLTK, and ESCU.
Mission Control for Modern Risk
Ciso Circle
6 Minute Read

Mission Control for Modern Risk

Discover how fusion centers merge cyber, fraud, and ops data into a mission‑control view. Automate response, and reduce risk faster than siloed teams.
The Splunk Platform Track at .conf25: 10 Sessions You Can't Miss
.conf & .conf Go
3 Minute Read

The Splunk Platform Track at .conf25: 10 Sessions You Can't Miss

Explore the Splunk Platform Track at .conf25! Discover 83 sessions on AI, data management, and digital resilience, including Cisco integrations. Accelerate your Splunk value.
Leveraging Machine Learning, Splunk Enterprise, the Splunk Edge Hub and MQTT for Data Integration
Partners
5 Minute Read

Leveraging Machine Learning, Splunk Enterprise, the Splunk Edge Hub and MQTT for Data Integration

Leverage existing hardware to build new datasets and insights with the combined power of the Splunk Platform and Cisco Meraki.
What is ABAC? Attribute Based Access Controls, Explained
Learn
5 Minute Read

What is ABAC? Attribute Based Access Controls, Explained

Learn what Attribute Based Access Control (ABAC) is, how it works, and why it offers flexible, fine-grained access management for today’s dynamic organizations.
What Is Natural Language Processing? A Complete Guide to NLP
Learn
9 Minute Read

What Is Natural Language Processing? A Complete Guide to NLP

Discover what natural language processing (NLP) is, how it works, key techniques, real-world applications, and the main challenges facing the field today.
Rethinking Observability: From Risk Mitigation to Business Transformation
Observability
4 Minute Read

Rethinking Observability: From Risk Mitigation to Business Transformation

Rethink observability—not as just an IT safety net, but as a catalyst for business growth and innovation. Discover how unified, real-time insights can turn complexity into your competitive edge.