/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Explore the Splunk SOAR Adoption Maturity Model
Security
3 Minute Read

Explore the Splunk SOAR Adoption Maturity Model

SOAR helps you orchestrate security workflows and automate tasks in seconds to empower your SOC, work smarter and respond faster. Increasingly, security automation is becoming seen as a milestone in maturing your security operations. And maturing security operations is something all organizations need to do, with the rising threat of attacks and threats of all kinds.
Dashboard Design: Visualization Choices and Configurations
Tips & Tricks
5 Minute Read

Dashboard Design: Visualization Choices and Configurations

Getting started with dashboards or looking for a refresh on best practices? Read this blog to learn how to design and build effective Splunk dashboards to drive data insights with these helpful tips on visualization choices and configurations!
Reputational Risk Mitigation
Industries
6 Minute Read

Reputational Risk Mitigation

This blog suggests several techniques for a company to detect issues that may affect their reputation mostly from a security point of view. Splunk's Nimish Doshi explains.
What's New in Splunk AR
Platform
2 Minute Read

What's New in Splunk AR

Learn about our powerful new set of features for Splunk AR, along with the launch of Splunk AR for Android Private Preview.
This Feels Scripted: Zeek Scripting and Splunk
Security
5 Minute Read

This Feels Scripted: Zeek Scripting and Splunk

Splunker Shannon Davis shares a closer look at updated searches for detecting SpookySSL.
New Splunk APM Enhancements Help Troubleshoot Your MySQL and NoSQL Databases Faster
Observability
2 Minute Read

New Splunk APM Enhancements Help Troubleshoot Your MySQL and NoSQL Databases Faster

Splunk Observability is making it quicker and easier to troubleshoot latency in MySQL and NoSQL databases, with two new enhancements.
Inside the Mind of a ‘Rat’ - Agent Tesla Detection and Analysis
Security
12 Minute Read

Inside the Mind of a ‘Rat’ - Agent Tesla Detection and Analysis

The Splunk Threat Research Team (STRT) describes the different tactics, techniques and procedures mapped to the ATT&CK framework leveraged by the Agent Tesla remote access trojan.
The Holiday Season Is Around the Corner, Are You Ready?
Observability
2 Minute Read

The Holiday Season Is Around the Corner, Are You Ready?

With the holiday season quickly approaching, you need to ensure your alert severity levels are adjusted accordingly for all your services and KPIs.
SOC, Amore Mio! Following .italo's Tracks to a More Mature SOC
Security
2 Minute Read

SOC, Amore Mio! Following .italo's Tracks to a More Mature SOC

Recently I sat down with Enrico Maresca, CISO of .italo, to discuss their security operations strategy and double click into multiple lessons learned and best practices. Enrico shared insight into what good looks like when communicating to the Board of Directors, discussed cyber security topics and SecOps use case development strategies.