/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Splunk University Is Boston-Bound This September
.conf & .conf Go
3 Minute Read

Splunk University Is Boston-Bound This September

Splunk Education is hosting Splunk University from September 6–8, 2025, starting days just prior to .conf25.
DNS Security: Today’s Most Common DNS Risks and Threats
Learn
5 Minute Read

DNS Security: Today’s Most Common DNS Risks and Threats

When 90% of businesses are victims of DNS attacks, you need to know about DNS security. Get the full story, including the top DNS risks, in this article.
The OSI Model: Understanding the Layered Approach to Network Communication
Learn
11 Minute Read

The OSI Model: Understanding the Layered Approach to Network Communication

The OSI Model is not old news...In fact, it's still in use across the entire internet today! Read on to see exactly how these 7 layers work.
How to Use Splunk to Monitor Security of Local LLMs (Part II)
Artificial Intelligence
4 Minute Read

How to Use Splunk to Monitor Security of Local LLMs (Part II)

Learn how to use Splunk to monitor and defend your local Large Language Models (LLMs).
What’s New With AppDynamics 25.4
Observability
4 Minute Read

What’s New With AppDynamics 25.4

Enhance troubleshooting and streamline operations with AppDynamics 25.4, leveraging new features like tagging, anomaly detection, and Session Replay to optimize performance.
From Instinct to Insight: Why Metrics Are Essential to Threat Hunting Success
Security
5 Minute Read

From Instinct to Insight: Why Metrics Are Essential to Threat Hunting Success

Splunker Tamara Chacon explores why metrics are critical to threat hunting success.
Accelerating Security Operations with Splunk and Foundation AI’s First Open-Source Security Model
Artificial Intelligence
7 Minute Read

Accelerating Security Operations with Splunk and Foundation AI’s First Open-Source Security Model

Cisco Foundation AI’s Foundation-sec-8b model brings a new wave of innovations and efficiency to security operations. As a purpose-built, open-weight Large Language Model (LLM) designed specifically for cybersecurity, Foundation-sec-8b enables security teams to act faster, reduce fatigue, and scale operations without compromising accuracy.
How To Use Splunk To Monitor Security of Local LLMs (Part I)
Artificial Intelligence
10 Minute Read

How To Use Splunk To Monitor Security of Local LLMs (Part I)

Learn how to use Splunk to monitor the security of local Large Language Models (LLMs) like Llama and GPT4ALL.
What Is Extortionware? Going Beyond Ransomware
Learn
4 Minute Read

What Is Extortionware? Going Beyond Ransomware

Learn what extortionware is, how it works, its impact, and how to protect your business from data leaks and reputational damage.