/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Staff Picks for Splunk Security Reading March 2023
Security
5 Minute Read

Staff Picks for Splunk Security Reading March 2023

In this month's Staff Picks blog, our Splunk security experts curate a list of presentations, whitepapers, and customer case studies that we feel are worth a read.
A Global Day of Service: Building Community Resilience Drives Social Impact
Splunk Life
2 Minute Read

A Global Day of Service: Building Community Resilience Drives Social Impact

On Friday, March 17, 2023, the Black Employees Achieve More at Splunk (BEAMS) and Womxn+ Employee Resource Groups (ERGs) partnered to host Splunk’s first-ever Global Day of Service.
Data Denormalization: The Complete Guide
Learn
6 Minute Read

Data Denormalization: The Complete Guide

To normalize or not normalize your data. Decide here, as we explain why you’d denormalize data (faster query times!) but also the reasons to avoid it.
AsyncRAT Crusade: Detections and Defense
Security
9 Minute Read

AsyncRAT Crusade: Detections and Defense

The Splunk Threat Research Team explores detections and defense against the Microsoft OneNote AsyncRAT malware campaign.
My Username Fields Have Passwords in Them! What Do I Do?
Security
3 Minute Read

My Username Fields Have Passwords in Them! What Do I Do?

Sometimes, users put their password into a username field and it gets logged into Splunk – learn how to identify this behavior and remediate it with SOAR.
What is Federated Search?
Learn
4 Minute Read

What is Federated Search?

Searching isn’t as easy as you think: did Google get your request? Are you pinging multiple databases? Is ChatGPT involved? Learn all about federated search here.
What Does "Zero Day" Mean?
Learn
4 Minute Read

What Does "Zero Day" Mean?

Nothing described with “zero” sounds good. That’s absolutely the case here, when it comes to zero-day vulnerabilities, exploits and attacks.
Breaking the Chain: Defending Against Certificate Services Abuse
Security
11 Minute Read

Breaking the Chain: Defending Against Certificate Services Abuse

Explore the common certificate abuses leveraged by current and relevant adversaries in the wild, the multiple methods they use to obtain certificates, how to gather relevant logs and ways to mitigate adversaries stealing certificates.
Machine Learning in Security: Detecting Suspicious Processes Using Recurrent Neural Networks
Security
7 Minute Read

Machine Learning in Security: Detecting Suspicious Processes Using Recurrent Neural Networks

Splunk's Kumar Sharad explains how to detect suspicious processes using recurrent neural networks.