/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Exploring DORA: Why creating a path to resilience maturity is a critical success factor for financial services organisations
Industries
5 Minute Read

Exploring DORA: Why creating a path to resilience maturity is a critical success factor for financial services organisations

In this blog, we share some insights about the requirements of DORA, as well as how Splunk can support financial services organisations on their resilience journey.
Splunk Aims To Provide a Secure Cloud Solution to the Federal Government With an 'In Process' Status for FedRAMP® High Authorization
Industries
2 Minute Read

Splunk Aims To Provide a Secure Cloud Solution to the Federal Government With an 'In Process' Status for FedRAMP® High Authorization

Splunk continues its commitment to the Federal Government by achieving an 'In Process' designation from the Federal Risk and Authorization Management Program (FedRAMP) Program Management Office (PMO) as it works towards FedRAMP High authorization.
Ransomware Families & RaaS Groups
Learn
4 Minute Read

Ransomware Families & RaaS Groups

Every 19 seconds a ransomware attack launches. Are these standalone attacks? Are they operating within a ransomware family of shared knowledge? Find out here.
Leadership differentiation opportunities in 2023
Leadership
6 Minute Read

Leadership differentiation opportunities in 2023

Irrespective of the prediction, trend or new amazing technology, its impact is only realised when successfully deployed by an organisation’s expert team(s). To help, I’ve captured just a few of my thoughts for how leaders can differentiate some broad demands to make the best impact in the year to come.
New Research on Digital Resilience Unveils Massive Opportunity for Organizations
Leadership
3 Minute Read

New Research on Digital Resilience Unveils Massive Opportunity for Organizations

Splunk's 'Digital Resilience Pays Off' report explores how organizations are investing in critical digital resilience capabilities and the business impact.
Threat Hunting vs. Threat Detecting: What's The Difference?
Learn
7 Minute Read

Threat Hunting vs. Threat Detecting: What's The Difference?

Hunting threats, detecting threats. Sounds the same — but they are not! Get tons of info (+ free resources) for prevention methods that underpin cybersecurity.
The Triple DES Intro: Triple Data Encryption Standard
Learn
3 Minute Read

The Triple DES Intro: Triple Data Encryption Standard

Triple DES is an encryption standard that’s NIST-approved for use through 2030. Let’s see how it works and when you want — and don’t want — to use it.
Elliptic Curve Cryptography: An Introduction
Learn
4 Minute Read

Elliptic Curve Cryptography: An Introduction

Let’s see how elliptic curve cryptography works, in this digestible, less academic look that still thoroughly explains this technical topic.
Splunk OnDemand Services: An Introduction & Example
Learn
3 Minute Read

Splunk OnDemand Services: An Introduction & Example

Get started with Splunk OnDemand Services (ODS), an advisory service that bridges the gap between Technical Support and project-based services delivered by Professional Services.