/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Security Content from the Splunk Threat Research Team
Security
5 Minute Read

Security Content from the Splunk Threat Research Team

The blog explains how STRT develops Splunk Security Content, aiding detection engineering and threat research teams to efficiently detect and respond to potential threats, using ESCU App amidst growing security incidents and system complexity.
Hypothesis-Driven Hunting with the PEAK Framework
Security
9 Minute Read

Hypothesis-Driven Hunting with the PEAK Framework

Details on hypothesis-driven threat hunting with the PEAK framework.
Industry Leaders Share Thoughts on the Cyber Talent Gap
Leadership
2 Minute Read

Industry Leaders Share Thoughts on the Cyber Talent Gap

Eric Fusilero is honored to be part of an esteemed panel of leaders who are thinking about innovative solutions to help fill the job vacancies being perpetuated by the ever-changing, data-centric industry.
Splunk Becomes a TISAX Participant
Industries
4 Minute Read

Splunk Becomes a TISAX Participant

With increasing focus on implementing security standards within the digital supply chain, national and industry-specific certifications have become increasingly important. Today, we are excited to announce that Splunk Services Germany GmbH has become a TISAX participant.
The Public Sector's Worst Nightmare: Fraud
Industries
2 Minute Read

The Public Sector's Worst Nightmare: Fraud

In this post, we’ll dive deeper into how much fraud affects the public sector.
Password Spraying Attacks: What You Need To Know To Prevent Attacks
Learn
6 Minute Read

Password Spraying Attacks: What You Need To Know To Prevent Attacks

Password spraying remains a threat today, despite improvements in password safety and privacy. Read all about this attack tactic in order to prevent it.
Planning for Success with Risk-Based Alerting
Security
4 Minute Read

Planning for Success with Risk-Based Alerting

In our last RBA blog post, we talked about some of the problems RBA can help solve. In this post, we explain the methodology we use with Splunk customers as their security teams start working with RBA.
Machine Learning in Security: Detect Suspicious TXT Records Using Deep Learning
Security
8 Minute Read

Machine Learning in Security: Detect Suspicious TXT Records Using Deep Learning

The Splunk Machine Learning for Security (SMLS) team introduces a new detection to detect DNS Tunneling using DNS TXT payloads.
Data Governance vs. Data Management: What's The Difference?
Learn
6 Minute Read

Data Governance vs. Data Management: What's The Difference?

Understanding the difference between data governance and data management is paramount in any setting where you’re managing (and monetizing) data.