/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Splunk Expands Data Management Capabilities To Include Agent Management
Platform
1 Minute Read

Splunk Expands Data Management Capabilities To Include Agent Management

Announcing the expansion of its Data Management capabilities to now include agent management to streamline operations in your Splunk environment.
Splunk Expands Data Management Capabilities To Include Ingest Monitoring
Platform
2 Minute Read

Splunk Expands Data Management Capabilities To Include Ingest Monitoring

Announcing an expansion of our data management capabilities in Splunk Cloud Platform to now include ingest monitoring.
Dashboard Studio: What's New in Splunk Enterprise 10.0 and 9.4
Platform
3 Minute Read

Dashboard Studio: What's New in Splunk Enterprise 10.0 and 9.4

Learn about top highlighted Dashboard Studio features available in Splunk Enterprise 10.0 and 9.4 such as version history tabbed dashboards, version history, publish dashboards, and more!
Achieve End-To-End Digital Visibility With the Splunk Cloud Platform at .conf25
.conf & .conf Go
1 Minute Read

Achieve End-To-End Digital Visibility With the Splunk Cloud Platform at .conf25

At .conf25, we're unveiling an array of bold product launches and portfolio enhancements that reaffirm our commitment to your success.
Beyond the Patch: SharePoint Exploits and the Hidden Threat of IIS Module Persistence
Security
12 Minute Read

Beyond the Patch: SharePoint Exploits and the Hidden Threat of IIS Module Persistence

The cybersecurity landscape witnessed a perfect storm in July 2025 when multiple critical SharePoint vulnerabilities collided with sophisticated IIS module-based persistence techniques, creating a nightmare scenario for enterprise defenders.
Partners Are the Advantage: Driving the Future at .conf25
.conf & .conf Go
3 Minute Read

Partners Are the Advantage: Driving the Future at .conf25

Join Cisco and Splunk at .conf25 in Boston for exclusive partner insights, networking, and AI-driven strategies. Discover how partnerships power digital operations, gain executive access, and elevate your brand at the premier event for innovation and growth in the AI-native enterprise.
Top 10 SIEM Use Cases Today: Real Examples and Business Value
Learn
8 Minute Read

Top 10 SIEM Use Cases Today: Real Examples and Business Value

Explore 10 real-world SIEM use cases — from log aggregation to insider threat detection — with examples, benefits, and tips for implementation.
Qualitative vs Quantitative: Which Research Method is Right for You?
Learn
8 Minute Read

Qualitative vs Quantitative: Which Research Method is Right for You?

Learn the differences, uses, and benefits of qualitative vs. quantitative research. Discover how to choose the right method for your data and projects.
CitrixBleed 2: When Memory Leaks Become Session Hijacks
Security
10 Minute Read

CitrixBleed 2: When Memory Leaks Become Session Hijacks

Discover how to detect, mitigate, and respond to CitrixBleed 2 (CVE-2025-5777), a critical Citrix NetScaler ADC and Gateway vulnerability exploited in the wild.