/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Threat Hunting with TLS/SSL Certificates
Security
4 Minute Read

Threat Hunting with TLS/SSL Certificates

TLS and SSL certificates are a great way to hunt advanced adversaries. Collect them with Splunk Stream, Bro, or Suricata and hunt in your own data!
Hunting with SA-Investigator & Splunk Enterprise Security (SIEM)
Security
4 Minute Read

Hunting with SA-Investigator & Splunk Enterprise Security (SIEM)

Discover how Splunk Enterprise Security and the SA-Investigator add-on empower analysts to streamline threat hunting and incident response. Learn how to pivot across assets, identities, and processes for deep-dive investigations and actionable insights. Happy hunting!
Hunting for Threats in VPCFlows
Security
7 Minute Read

Hunting for Threats in VPCFlows

This article will look at native AWS network telemetry — VPCFlows. We’ll explore what it is, how you can ingest it, and what value it provides from a security perspective.
XWorm's Shape-Shifting Arsenal: Loader and Stager Variants in the Wild
Security
13 Minute Read

XWorm's Shape-Shifting Arsenal: Loader and Stager Variants in the Wild

Explore XWorm's shape-shifting tactics, evolution, and persistence, and how Splunk helps detect this RAT.
What To Know Before Agentic AI Starts Driving Security and Fraud Workflows
Ciso Circle
8 Minute Read

What To Know Before Agentic AI Starts Driving Security and Fraud Workflows

The essential guardrails for safe AI deployment in financial services.
Machine Learning in Splunk Enterprise Security: Unleashing Hidden Detection Power
Security
15 Minute Read

Machine Learning in Splunk Enterprise Security: Unleashing Hidden Detection Power

Discover how Splunk Enterprise Security 8.0 revamps machine learning, spots hidden threats, simplifies anomaly detection, and turbocharges your SOC.
What is Automated Incident Response? Benefits, Processes, and Challenges Explained
Learn
4 Minute Read

What is Automated Incident Response? Benefits, Processes, and Challenges Explained

Discover how automated incident response streamlines IT operations, reduces costs, and enhances efficiency by automating key processes like triage and diagnostics.
Splunk Attack Analyzer Introduces Built-in Translation and Achieves SOC 2 Compliance
Security
2 Minute Read

Splunk Attack Analyzer Introduces Built-in Translation and Achieves SOC 2 Compliance

Splunk Attack Analyzer enhances threat analysis with built-in email/document translation and achieves SOC 2 compliance.
Celebrate 10 Years of Boss of the SOC at .conf25
.conf & .conf Go
2 Minute Read

Celebrate 10 Years of Boss of the SOC at .conf25

We're proud to celebrate a decade of BOTS with BOTS10 at .conf25, featuring an evening of unique experiences and surprises.