/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Data Encryption Methods & Types: A Beginner's Guide
Learn
11 Minute Read

Data Encryption Methods & Types: A Beginner's Guide

In this article, we'll discuss data encryption methods including symmetric and asymmetric encryption, common algorithms, and best practices.
Introducing Splunk Attack Range v3.1
Security
3 Minute Read

Introducing Splunk Attack Range v3.1

The Splunk Threat Research Team is happy to release v3.1 of Splunk Attack Range.
Vulnerability Prioritization Is a Treat for Defenders
Security
3 Minute Read

Vulnerability Prioritization Is a Treat for Defenders

There have been numerous high-profile cybersecurity incidents where vulnerability management had an impact on severe breaches – here are some notable examples.