/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Monitoring IaaS (Infrastructure as a Service)
Learn
3 Minute Read

Monitoring IaaS (Infrastructure as a Service)

Monitoring cloud services isn't easy, especially when it comes to IaaS. Read on to understand the importance of IaaS monitoring and what problems it can help you solve.
From Water to Wine: An Analysis of WINELOADER
Security
9 Minute Read

From Water to Wine: An Analysis of WINELOADER

In this blog post we'll look closely at the WINELOADER backdoor and how Splunk can be used to detect and respond to this threat.
March 2024 Living Our Values Award Winners
Splunk Life
3 Minute Read

March 2024 Living Our Values Award Winners

Cheers for the Splunkers who embody our core values of innovative, passionate, disruptive, open and fun!
A Tale of Two SOCs: How Student-Powered Security Operations Centers are Addressing the Cyber Talent Shortage
Ciso Circle
6 Minute Read

A Tale of Two SOCs: How Student-Powered Security Operations Centers are Addressing the Cyber Talent Shortage

Universities with student SOC programs are giving their students the opportunity to develop useful skillsets and receive real-world training in cybersecurity
Splunk SOAR Playbook of the Month: Cisco Umbrella DNS Denylisting
Security
2 Minute Read

Splunk SOAR Playbook of the Month: Cisco Umbrella DNS Denylisting

Cisco and Splunk can help users achieve more comprehensive security with a playbook that combines the power of Cisco Umbrella and Splunk SOAR.
Splunk at RSAC 2024: Powering the SOC of the Future
Security
4 Minute Read

Splunk at RSAC 2024: Powering the SOC of the Future

Visit Splunk at RSAC 2024 and see how we can help you evolve to the SOC of the future.
Meeting Agency Goals through Cloud Modernization
Industries
4 Minute Read

Meeting Agency Goals through Cloud Modernization

Splunk can help U.S. Government agencies leverage cloud-based solutions to meet mission and operational goals.
Network Topology: The Complete Guide
Learn
6 Minute Read

Network Topology: The Complete Guide

Understand why network topology is the backbone of every organization. Learn about different types and best practices.
Introduction to Virtualized Security
Learn
4 Minute Read

Introduction to Virtualized Security

Virtualized security is the term for how to secure your virtualized, VM-based IT environments. Get the full story here.