/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Empower Your Organization with Splunk On the Go
Platform
2 Minute Read

Empower Your Organization with Splunk On the Go

Get an overview of Splunk Mobile, learn about new Splunk Mobile features, and find out how easy it is to build dashboards for Splunk Mobile.
Thank You Splunkterns 2021 - You’ve Been Epic
Splunk Life
2 Minute Read

Thank You Splunkterns 2021 - You’ve Been Epic

Every year Splunk runs a global intern program with students from all over the world joining Splunk in many different functions. Matt Davies talks about what makes the Splunktern experience so special.
Threat Advisory: Telegram Crypto Botnet STRT-TA01
Security
6 Minute Read

Threat Advisory: Telegram Crypto Botnet STRT-TA01

The Splunk Threat Research Team (STRT) has detected the resurface of a Crypto Botnet using Telegram, a widely used messaging application that can create bots and execute code remotely. Learn more about the indicators of the botnet operation and use our pre-built and tested detections to find them in your environment.
.conf21 Virtual Splunk4U Track: The Best From Community, DEI, Splunk for Good, and Splunk on Splunk
.conf & .conf Go
3 Minute Read

.conf21 Virtual Splunk4U Track: The Best From Community, DEI, Splunk for Good, and Splunk on Splunk

Discover the key sessions and what to expect from the Splunk4U track at .conf21 Virtual, featuring the Splunk Community, Diversity & Inclusion, Splunk for Good, and Splunk on Splunk.
Go with your Data Flow - Improve your Machine Learning Pipelines
Platform
3 Minute Read

Go with your Data Flow - Improve your Machine Learning Pipelines

How do you organize the data flow in Splunk Enterprise or Splunk Cloud? Splunker Philipp Drieger shares typical data pipeline patterns that will help you improve your existing or future machine learning workflows with MLTK or DLTK.
A Zero Trust Security Approach for Government: Increasing Security but also Improving IT Decision Making
Industries
3 Minute Read

A Zero Trust Security Approach for Government: Increasing Security but also Improving IT Decision Making

Public sector organisations are in the middle of a massive digital transformation. This transformation also opens new avenues for cyberthreats and expands the attack surface. The traditional approach is to collect data at the rapidly eroding perimeter, subsequently ignoring users as they continue into the network. Zero-trust architectures require government departments to continuously monitor, detect, evaluate, and enforce policy as users move about the network.
Trickbot Detections: Threat Research Release, July 2021
Security
4 Minute Read

Trickbot Detections: Threat Research Release, July 2021

The Splunk Threat Research Team (STRT) addressed Trickbot in the July release. Trickbot is a very popular crimeware carrier (Trojan) associated with current campaigns.
Splunker Stories: Judith Kim
Splunk Life
3 Minute Read

Splunker Stories: Judith Kim

In the latest edition of our 'Splunker Stories' series, we meet one of Splunk’s Technical Support Account Managers, Judith Kim.
Staff Picks for Splunk Security Reading July 2021
Security
2 Minute Read

Staff Picks for Splunk Security Reading July 2021

These monthly postings will feature the favorite security-centric presentations, white papers and customer case studies from various peeps in the Splunk (or not) security world that WE think everyone should read. If you would like to read other months, please take a peek at previous posts in the "Staff Picks" series!