/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Enhancements To Ingest Actions Improve Usability and Expand Searchability Wherever Your Data Lives
Platform
4 Minute Read

Enhancements To Ingest Actions Improve Usability and Expand Searchability Wherever Your Data Lives

Along with the respective Splunk Enterprise version 9.1.0 and Splunk Cloud Version 9.0.2305 releases, Ingest Actions has launched a new set of features and capabilities that improve its usability and expand on configurability of data routed by Ingest Actions to S3.
Follow Splunk Down a Guided Path to Resilience
Customers & Community
2 Minute Read

Follow Splunk Down a Guided Path to Resilience

The Prescriptive Adoption Motions for Security and Observability offer technical expertise, best practices, and product knowledge to help you with key use cases.
Cryptographically Relevant Quantum Computers (CRQCs) & The Quantum Threat
Learn
5 Minute Read

Cryptographically Relevant Quantum Computers (CRQCs) & The Quantum Threat

Quantum computing sounds scary (depending on your source), but you don't have to be worried! Get expert information on today's quantum threat.
Making Sense of the New SEC Cybersecurity Rules and What They Could Mean for Your Company
Security
2 Minute Read

Making Sense of the New SEC Cybersecurity Rules and What They Could Mean for Your Company

The United States Securities and Exchange Commission’s (SEC) July 26 approval of new cybersecurity 'incident' disclosure rules is top of mind for every public company, and understanding what it means and how companies will be held accountable is crucial.
ML-Powered Assistance for Adaptive Thresholding in ITSI
Artificial Intelligence
7 Minute Read

ML-Powered Assistance for Adaptive Thresholding in ITSI

ML-Assisted Thresholding provides recommendations for time policies, algorithms, and thresholds for Splunk ITSI adaptive thresholding.
Why Shared Storytelling Is Key for a Strong Cybersecurity Community
Ciso Circle
3 Minute Read

Why Shared Storytelling Is Key for a Strong Cybersecurity Community

How a single-day event inspired a group of infosec pros to write about their experiences — and better the security community at large.
Open Cybersecurity Schema Framework (OCSF) Takes Flight with v1.0 Schema Release
Security
3 Minute Read

Open Cybersecurity Schema Framework (OCSF) Takes Flight with v1.0 Schema Release

The Open Cybersecurity Schema Framework (OCSF) celebrates its first anniversary with the launch of a new open data schema.
Executive Orders: What Happens When CIOs, CTOs and CISOs Join Forces
Ciso Circle
3 Minute Read

Executive Orders: What Happens When CIOs, CTOs and CISOs Join Forces

Finessing board communications. Navigating the explosion of large language models. Considering the state of cyber warfare. These are just a few conversation topics that crop up when CxOs get together.
Modeling and Unifying DevOps Data
Observability
5 Minute Read

Modeling and Unifying DevOps Data

Embrace data models and bring order to the chaos as we break down elements and commonalities in various stages of the DevOps lifecycle starting with Work Planning.