/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

The Real Cost of Disjointed Security Tools in the SOC
Ciso Circle
3 Minute Read

The Real Cost of Disjointed Security Tools in the SOC

Overcome data gravity by activating the right data, not just accumulating it. Learn how to boost digital resilience, optimize hybrid cloud, and leverage AI effectively.
Community at .conf25: SplunkTrust Stories Series (Part 4)
.conf & .conf Go
2 Minute Read

Community at .conf25: SplunkTrust Stories Series (Part 4)

For SplunkTrust members like Michael Bentley, .conf isn't just another technology conference – it's become something far more personal.
Modern C2 Attacks: Detect & Defend Command-and-Control
Learn
7 Minute Read

Modern C2 Attacks: Detect & Defend Command-and-Control

Learn how command-and-control (C2) attacks work, including emerging stealth techniques, real-world examples, and modern detection using AI and behavioral analysis.