/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

What are Diffusion Models?
Learn
4 Minute Read

What are Diffusion Models?

Learn about diffusion models, a groundbreaking AI development that generates high-quality images, videos, and text. Explore their applications, how they work, and future potential.
How To Create Successful SOPs: Standard Operating Procedures
Learn
5 Minute Read

How To Create Successful SOPs: Standard Operating Procedures

Need to write SOPs? Check out this complete guide to creating successful standard operating procedures, including how to write one and manage it over time.
What Is a SOC? Security Operations Centers: A Complete Overview
Learn
11 Minute Read

What Is a SOC? Security Operations Centers: A Complete Overview

In this article, we'll discuss security operations center (SOC), which acts as the central hub for all cybersecurity activities in an organization.
Digital Resilience for State and Local Governments (Part One)
Industries
4 Minute Read

Digital Resilience for State and Local Governments (Part One)

Overcome complexity, siloed systems, and shifting from reactive to proactive incident management with Splunk's innovative solutions.
RSAC™ 2025 Conference: The Complete Guide
Learn
5 Minute Read

RSAC™ 2025 Conference: The Complete Guide

This blog post is the complete guide to the 2025 RSA conference.
Sinister SQL Queries and How to Catch Them
Security
16 Minute Read

Sinister SQL Queries and How to Catch Them

Discover comprehensive strategies for detecting and mitigating SQL Server attacks.
Meet the Splunktern: Jeannine Elmasri
Splunk Life
3 Minute Read

Meet the Splunktern: Jeannine Elmasri

Meet Jeannine Elmasri, a Technical Writing Intern currently in her third year at Stockton University.
Cut the Bloat, Keep the Value – A Strategic Plan for Tool Consolidation
Cto Stack
4 Minute Read

Cut the Bloat, Keep the Value – A Strategic Plan for Tool Consolidation

Successful tool consolidation starts with the right plan. Follow this framework to evaluate and prioritize consolidation with confidence.
The OWASP Top 10 Explained: Today’s Top Risks in Web Apps and LLMs
Learn
9 Minute Read

The OWASP Top 10 Explained: Today’s Top Risks in Web Apps and LLMs

Learn about OWASP top 10, a critical benchmark for your web application security, and now LLM security, since its inception in 2003.