/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Customer Experience (CX) Metrics
Learn
6 Minute Read

Customer Experience (CX) Metrics

Learn everything you need to know about network architecture and follow the best practices to maintain your architecture’s security.
The Dollars and Sense of Data Strategy: Managing Data, Agility and Value
Leadership
2 Minute Read

The Dollars and Sense of Data Strategy: Managing Data, Agility and Value

Tom Casey explains the way Splunk is revolutionizing how organizations get unified visibility and insights from their data.
What Are Foundation Models in AI?
Learn
3 Minute Read

What Are Foundation Models in AI?

A Foundation Model is a general class of AI models trained on large data assets at scale. See how these models work & how essential they are to achieving AGI.
What Is Network Architecture?
Learn
4 Minute Read

What Is Network Architecture?

Learn everything you need to know about network architecture and follow the best practices to maintain your architecture’s security.
What’s Splunk Doing With AI?
Artificial Intelligence
4 Minute Read

What’s Splunk Doing With AI?

Splunker Jeff Wiedemann answers the question 'What is Splunk doing with AI?'
Splunk SOAR Playbook of the Month: Splunk Attack Analyzer Dynamic Analysis
Security
2 Minute Read

Splunk SOAR Playbook of the Month: Splunk Attack Analyzer Dynamic Analysis

For this Splunk SOAR Playbook of the Month, Splunker Coty Sugg shows how to use one of our out-of-the-box playbooks for faster, simpler, and more effective dynamic analysis.
Threat Hunting in 2025: Must-Have Resources & Tasks for Every Hunter
Security
7 Minute Read

Threat Hunting in 2025: Must-Have Resources & Tasks for Every Hunter

What are the most important things threat hunters do every day? We surveyed professionals and here are the must-have tasks and resources.
Calling CISOs Everywhere: Minimize Breaches by Thinking Like a Hacker and Testing Your Controls
Ciso Circle
1 Minute Read

Calling CISOs Everywhere: Minimize Breaches by Thinking Like a Hacker and Testing Your Controls

Compliance requirements and maturity frameworks are helpful, but pay attention to the real threats in your environment to actually prevent breaches.
The Makings of a Successful Organization in 2027 and Beyond
Cto Stack
3 Minute Read

The Makings of a Successful Organization in 2027 and Beyond

How do organizations future-proof tech against threats, both known and novel? Splunk’s SVP and GM of products and technology weighs in.