/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

It Takes a Village – And Some New Features From Splunk – To Scale Your Cloud Monitoring Without Breaking the Bank
Observability
4 Minute Read

It Takes a Village – And Some New Features From Splunk – To Scale Your Cloud Monitoring Without Breaking the Bank

New features within Splunk Observability Cloud empower engineering teams to scale their observability practice while controlling costs.
Are You a Good or Great Boxer? Real-World Approaches of Building Cyber Resilience in 2023
Leadership
6 Minute Read

Are You a Good or Great Boxer? Real-World Approaches of Building Cyber Resilience in 2023

You must have been asleep not to have heard about Splunk’s new mission - ‘to build a safer and more resilient digital world’. Why have we chosen this? Well, not because it is a snappy little tagline, but because we know how important digital resilience is to all of our customers in our ever changing times.
Introducing the PEAK Threat Hunting Framework
Security
4 Minute Read

Introducing the PEAK Threat Hunting Framework

Introducing the PEAK Threat Hunting Framework, bringing a fresh perspective to threat hunting and incorporating three distinct types of hunts.
Send Your SOAR Events to Splunk
Security
3 Minute Read

Send Your SOAR Events to Splunk

Make your SIEM your single point of truth by ingesting events that are otherwise seen only by Splunk Security, Orchestration, Automation and Response (SOAR).
Building a Safer and More Resilient Digital World
Leadership
3 Minute Read

Building a Safer and More Resilient Digital World

Splunk CEO, Gary Steele, reflects on his first year and the moments that have shown how Splunk provides mission-critical value to security, IT and engineering teams globally.
Kotter’s 8 Steps for Leading Change in Organizations
Learn
4 Minute Read

Kotter’s 8 Steps for Leading Change in Organizations

Organizational change is hard. But following 8 steps will help! Read on for practical tips and insights for success with the Kotter 8 step process.
These Are The Drivers You Are Looking For: Detect and Prevent Malicious Drivers
Security
15 Minute Read

These Are The Drivers You Are Looking For: Detect and Prevent Malicious Drivers

The Splunk Threat Research Team explores how to detect and prevent malicious drivers and discusses Splunk Security Content available to defend against these types of attacks.
Addressing CISOs AI Anxieties Through Resilience
Security
10 Minute Read

Addressing CISOs AI Anxieties Through Resilience

Splunk's Paul Kurtz explores how CISOs’ jobs will become more complex as they address AI-driven attacks, automated vulnerability exploitation, battle data poisoning, or deep fakes that make current phishing tactics look quaint.
Level Up Your Cybersecurity with Risk-Based Alerting
Security
3 Minute Read

Level Up Your Cybersecurity with Risk-Based Alerting

In our first blog in the Splunk RBA series, we introduced Risk-Based Alerting (RBA) and covered the basic principles of RBA. In the rest of this series, we explain how you can plan and then implement RBA within your organization.