/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

The Best of .conf23: Partnerships, Edge Data and the Right Kind of Intelligence
.conf & .conf Go
3 Minute Read

The Best of .conf23: Partnerships, Edge Data and the Right Kind of Intelligence

Splunk SVP and GM EMEA Petra Jenner shares a recap of the highlights and the most significant innovations and announcements of .conf23.
What Is Adaptive Thresholding?
Learn
10 Minute Read

What Is Adaptive Thresholding?

Making thresholds adaptive supports your overall monitoring strategy. Read on for four tips for configuring adaptive thresholding for high-value use cases.
Destination: Greater Digital Resilience
Leadership
2 Minute Read

Destination: Greater Digital Resilience

Splunk’s Chief Revenue Officer Christian Smith shares a new resource to help organizations build greater digital resilience.
Amdahl’s Law: Understanding the Basics
Learn
3 Minute Read

Amdahl’s Law: Understanding the Basics

Learn how Amdahl's Law guides system optimization in computing. Identify bottlenecks, maximize returns, and leverage parallel computing
Splunk Edge Processor Enhancements Offer Greater Data Access and Improve Data Management
Platform
1 Minute Read

Splunk Edge Processor Enhancements Offer Greater Data Access and Improve Data Management

On the heels of an exciting GA in March and the April announcement of its regional expansion, we are excited to share the latest updates to Splunk Edge Processor that will make it even easier for customers to have more flexibility and control over just the data you want, nothing more nothing less.
The 3 Rs of Enterprise Security: Rotate, Repave, Repair
Learn
5 Minute Read

The 3 Rs of Enterprise Security: Rotate, Repave, Repair

Protect your enterprise from evolving cyber threats with the 3Rs of security: Rotate, Repave, and Repair. Stay ahead of attackers and secure your organization.
What is HSTS?
Learn
6 Minute Read

What is HSTS?

Learn about HTTP Strict Transport Security (HSTS) for secure web communication, mitigating threats, and its limitations.
Turning Hunts Into Detections with PEAK
Security
4 Minute Read

Turning Hunts Into Detections with PEAK

In this post, we’re going to look at something the PEAK framework refers to as the Hierarchy of Detection Outputs.
Staff Picks for Splunk Security Reading July 2023
Security
3 Minute Read

Staff Picks for Splunk Security Reading July 2023

Welcome to the July 2023 edition of our Splunk staff picks blog, featuring a list of presentations, whitepapers, and customer case studies that we feel are worth a read.