/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Ghost in the Web Shell: Introducing ShellSweep
Security
7 Minute Read

Ghost in the Web Shell: Introducing ShellSweep

Splunk introduces ShellSweep, a suite of utilities designed to detect and combat malicious web shells in servers.
December 2023 Living Our Values Award Winners
Splunk Life
2 Minute Read

December 2023 Living Our Values Award Winners

Cheers to the Splunkers who embody our core values of innovative, passionate, disruptive, open and fun.
The Importance of Traces for Modern APM [Part 2]
Observability
5 Minute Read

The Importance of Traces for Modern APM [Part 2]

In the second part of this blog we will explore how increased entropy forces us to rethink what is required for monitoring.
Hunting M365 Invaders: Blue Team's Guide to Initial Access Vectors
Security
17 Minute Read

Hunting M365 Invaders: Blue Team's Guide to Initial Access Vectors

Discover insights from the Splunk Threat Research Team on Microsoft 365 threat detection, focusing on data source analysis and effective methods for hunting initial access threats.
Google Dorking: An Introduction for Cybersecurity Professionals
Learn
6 Minute Read

Google Dorking: An Introduction for Cybersecurity Professionals

In this blog post, we'll take a look at the basics of Google Dorking (AKA Google Hacking), how it can impact your organization, and steps you can take to mitigate this risk.
Find the Unusual with the Splunk App for Behavioral Profiling 2.0
Tips & Tricks
3 Minute Read

Find the Unusual with the Splunk App for Behavioral Profiling 2.0

We're excited to announce the release of the Splunk App for Behavioral Profiling 2.0 with a variety of capabilities providing enhancements across the application workflow in response to customer feedback.
Tips and Tactics for Strategic Tooling
Cto Stack
1 Minute Read

Tips and Tactics for Strategic Tooling

Suid Adeyanju, CEO of London-based cyber security consultancy RiverSafe, joins the Perspectives pod to discuss data access, strategically tackling tool sprawl and more.
Risk Mitigation for Organizations: The Complete Guide
Learn
7 Minute Read

Risk Mitigation for Organizations: The Complete Guide

Risks aren't always bad, but some sure are. Mitigate the risks you can, with a variety of risk strategies available to you. Learn more here.
OT Security Is Different, Isn’t IT?
Security
5 Minute Read

OT Security Is Different, Isn’t IT?

Explore the differences between OT security and IT security, delving into industry-specific challenges and solutions, with insights into the Purdue Model and how Splunk can help.