/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Data Challenges Pave Way for Creative Strategies
Cio Office
5 Minute Read

Data Challenges Pave Way for Creative Strategies

How AI, collaboration, and unified platforms are reshaping the way organizations think about data.
Understanding Attack Surfaces: What They Are and Why They Matter
Learn
4 Minute Read

Understanding Attack Surfaces: What They Are and Why They Matter

Learn what an attack surface is, why it matters, and how organizations can reduce risk by identifying and managing every exposure point, technical or human.
What Is Attack Surface Management? A Complete Guide To ASM
Learn
5 Minute Read

What Is Attack Surface Management? A Complete Guide To ASM

Understand Attack Surface Management (ASM), explore its 4-step lifecycle, real-world examples, best tools, and how it strengthens your security strategy.
Splunk @ SAPPHIRE 2025 Recap: How SAP Customers Use Splunk for World-Class Observability and Security
Security
4 Minute Read

Splunk @ SAPPHIRE 2025 Recap: How SAP Customers Use Splunk for World-Class Observability and Security

Splunker Keith Hontz shares a look at the Splunk highlights from SAP SAPPHIRE 2025.
Get Involved: Start Contributing to Splunk Technology Add-Ons!
Platform
1 Minute Read

Get Involved: Start Contributing to Splunk Technology Add-Ons!

Join the Splunk Technology Add-ons Community Contribution program to help enhance Splunk TAs with bug fixes, features, and improved data onboarding.
Splunk Security Content for Threat Detection & Response: June Recap
Security
2 Minute Read

Splunk Security Content for Threat Detection & Response: June Recap

Learn about the latest security content from Splunk.
Human in the Loop (HITL) in Practice: A Guide to Core HITL Concepts, Benefits, and Effective AI Collaboration
Learn
6 Minute Read

Human in the Loop (HITL) in Practice: A Guide to Core HITL Concepts, Benefits, and Effective AI Collaboration

Learn more about HITL. Human in the Loop is the crucial role of human intervention in an automated or AI-driven process.
How To Use CloudTrail Data for Security Operations & Threat Hunting
Security
6 Minute Read

How To Use CloudTrail Data for Security Operations & Threat Hunting

This blog post reviews AWS cloudtrail as a security logging source and how to hunt in it
When Installers Turn Evil: The Pascal Script Behind Inno Setup Malware Campaign
Security
16 Minute Read

When Installers Turn Evil: The Pascal Script Behind Inno Setup Malware Campaign

Uncover the Inno Setup malware campaign leveraging Pascal scripting to deliver RedLine Stealer.