/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Cyber Regulations Are a Goldmine — If You Use Them Right
Ciso Circle
6 Minute Read

Cyber Regulations Are a Goldmine — If You Use Them Right

Leverage regulations for a business edge.
What Cybersecurity Means in 2026: A Complete Overview of Cybersecurity
Learn
8 Minute Read

What Cybersecurity Means in 2026: A Complete Overview of Cybersecurity

Learn about cybersecurity and its importance. Take a look at various kinds of cyber threats, risks, and tools and frameworks to mitigate them.
Defending at Machine-Speed: Accelerated Threat Hunting with Open Weight LLM Models
Security
5 Minute Read

Defending at Machine-Speed: Accelerated Threat Hunting with Open Weight LLM Models

Splunker Ryan Fetterman explains how Splunk DSDL 5.2 enhances cybersecurity operations, streamlining PowerShell script classification and reducing analyst workload by 250x.
What are Diffusion Models?
Learn
4 Minute Read

What are Diffusion Models?

Learn about diffusion models, a groundbreaking AI development that generates high-quality images, videos, and text. Explore their applications, how they work, and future potential.
How To Create Successful SOPs: Standard Operating Procedures
Learn
5 Minute Read

How To Create Successful SOPs: Standard Operating Procedures

Need to write SOPs? Check out this complete guide to creating successful standard operating procedures, including how to write one and manage it over time.
What Is a SOC? Security Operations Centers: A Complete Overview
Learn
11 Minute Read

What Is a SOC? Security Operations Centers: A Complete Overview

In this article, we'll discuss security operations center (SOC), which acts as the central hub for all cybersecurity activities in an organization.
Digital Resilience for State and Local Governments (Part One)
Industries
4 Minute Read

Digital Resilience for State and Local Governments (Part One)

Overcome complexity, siloed systems, and shifting from reactive to proactive incident management with Splunk's innovative solutions.
RSAC™ 2025 Conference: The Complete Guide
Learn
5 Minute Read

RSAC™ 2025 Conference: The Complete Guide

This blog post is the complete guide to the 2025 RSA conference.
Sinister SQL Queries and How to Catch Them
Security
16 Minute Read

Sinister SQL Queries and How to Catch Them

Discover comprehensive strategies for detecting and mitigating SQL Server attacks.