/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Defending at Machine Speed: Guiding LLMs with Security Context
Security
7 Minute Read

Defending at Machine Speed: Guiding LLMs with Security Context

Enhance LLM performance for cybersecurity tasks with few-shot learning, RAG, & fine-tuning guide models for accurate PowerShell classification.
Splunk Security Content for Threat Detection & Response: May Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: May Recap

There are 13 new analytics and 4 new analytic stories now available in Splunk Enterprise Security via the ESCU application update process.
Using Splunk to Monitor the Security of MCP Servers
Artificial Intelligence
9 Minute Read

Using Splunk to Monitor the Security of MCP Servers

Learn how to use Splunk to monitor MCP Server security.
Beyond the Music: Lessons from Spotify's Fleet Management Journey
Ciso Circle
6 Minute Read

Beyond the Music: Lessons from Spotify's Fleet Management Journey

Learn how Spotify leverages standardized tooling, automated pipelines, and organizational alignment to transform challenges into opportunities for innovation.
Building the Future: Splunk Developer Sessions You Can't Miss at .conf25
.conf & .conf Go
3 Minute Read

Building the Future: Splunk Developer Sessions You Can't Miss at .conf25

Join us at .conf25 for an amazing lineup of sessions, activities, and expert staff covering best practices that are tailored to elevate your Splunk development game.
Advanced Persistent Threats (APTs): What They Are and How to Defend Against Them
Learn
8 Minute Read

Advanced Persistent Threats (APTs): What They Are and How to Defend Against Them

Learn about Advanced Persistent Threats (APTs): their stages, characteristics, real-world examples like Operation Aurora, and strategies to protect your organization.
Deep Packet Inspection (DPI) Explained: OSI Layers, Real-World Applications & Ethical Considerations
Learn
4 Minute Read

Deep Packet Inspection (DPI) Explained: OSI Layers, Real-World Applications & Ethical Considerations

Explore Deep Packet Inspection (DPI): how it boosts security & network ops, its applications, and the crucial privacy vs. security debate.
Stopping the Silent Drain: How Governments Can Combat Property Tax Fraud
Industries
4 Minute Read

Stopping the Silent Drain: How Governments Can Combat Property Tax Fraud

Discover how governments can use Splunk's data analytics platform for proactive detection and prevention, safeguarding essential services.
The Guide to Network Forensics: Importance, Tools, and Use Cases
Learn
9 Minute Read

The Guide to Network Forensics: Importance, Tools, and Use Cases

Learn how network forensics helps investigate cyberattacks, detect real-time threats, and protect systems with tools, techniques, and real-world use cases.