/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

The Observability Center of Excellence, Part II: From Pitch to Formation
Observability
6 Minute Read

The Observability Center of Excellence, Part II: From Pitch to Formation

Dive into the steps to form your very own Observability Center of Excellence (CoE) team.
NOCs vs. SOCs: Network & Security Operations Centers Compared
Learn
5 Minute Read

NOCs vs. SOCs: Network & Security Operations Centers Compared

NOCs and SOCs share similar goals, but they achieve them by monitoring different IT operational areas. Learn the difference here.
The Platform Engineer Role Explained: Who Is a Platform Engineer?
Learn
9 Minute Read

The Platform Engineer Role Explained: Who Is a Platform Engineer?

Interested in becoming a platform engineer? Need to hire one? Let's dive into this topic and learn about platform engineer responsibilities.
Life as a Product Management Intern: Austin Wilson
Splunk Life
2 Minute Read

Life as a Product Management Intern: Austin Wilson

Product Management Intern Austin Wilson shares his experience at Splunk, working remotely from Boulder, CO while giving back and using Splunk for good.
Hacking 101: Black Hat vs. White Hat vs. Gray Hat Hacking
Learn
7 Minute Read

Hacking 101: Black Hat vs. White Hat vs. Gray Hat Hacking

What's the difference between black hat, white hat, and gray hat? Read on to learn about these hacking categories.
What Is Incident Response?
Learn
14 Minute Read

What Is Incident Response?

In this post, we'll cover what incident response is and why it's essential for organizations to protect themselves from digital threats.
Cybersecurity Threats: What They Are & How They Work Today
Learn
12 Minute Read

Cybersecurity Threats: What They Are & How They Work Today

In this article, we discuss cybersecurity threats including how they've evolved, common threats, and the best practices to deal with them.
ValleyRAT Insights: Tactics, Techniques, and Detection Methods
Security
12 Minute Read

ValleyRAT Insights: Tactics, Techniques, and Detection Methods

The Splunk Threat Research Team conducts an analysis for several variants of ValleyRAT’s malware samples to extract its MITRE ATT&CK tactics, techniques, and procedures (TTPs).
GovSummit Is Returning to the Nation’s Capital – Here Are the Top 3 Reasons You Should Attend
Industries
3 Minute Read

GovSummit Is Returning to the Nation’s Capital – Here Are the Top 3 Reasons You Should Attend

Join us at GovSummit as we demonstrate how you can deliver on the nation’s cyber strategy with Splunk.