/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Recovery Point Objective (RPO) vs. Recovery Time Objective (RTO): What’s The Difference?
Learn
4 Minute Read

Recovery Point Objective (RPO) vs. Recovery Time Objective (RTO): What’s The Difference?

For online services and products, availability is the name of the game. Learn what RPO and RTO mean for availability — and how to set them for your organization.
Splunk Now Generally Available on Microsoft Azure
Partners
2 Minute Read

Splunk Now Generally Available on Microsoft Azure

Splunk arrives on Microsoft Azure, giving the vast majority of Fortune 2000 companies an easier way to enable enterprise-grade security and observability.
Paving the Way for Unified Cybersecurity: OCSF Joins the Linux Foundation with Splunk’s Support
Security
4 Minute Read

Paving the Way for Unified Cybersecurity: OCSF Joins the Linux Foundation with Splunk’s Support

Unified cybersecurity takes a step forward as OCSF joins the Linux Foundation, backed by Splunk’s support.
Splunk Enterprise Security 8.0: Customer Feedback
Security
1 Minute Read

Splunk Enterprise Security 8.0: Customer Feedback

Splunk Enterprise Security 8.0 delivers unified workflows, alert aggregation, and detection versioning to empower security teams, shaped by customer feedback.
What's The CIA Triad? Confidentiality, Integrity, & Availability, Explained
Learn
10 Minute Read

What's The CIA Triad? Confidentiality, Integrity, & Availability, Explained

The CIA security triad guides information security strategies to inform areas like security framework implementation and cyber threat.
What is Cloud Native Application Protection Platform: Everything You Need to Know
Learn
4 Minute Read

What is Cloud Native Application Protection Platform: Everything You Need to Know

Learn what the Cloud Native Application Protection Platform (CNAPP) is and how it works to secure cloud applications.
What Is Distributed Tracing?
Learn
11 Minute Read

What Is Distributed Tracing?

When your IT systems, apps, and software are spread out, you need a way to see what’s happening across all these. Learn how distributed tracing can help.
What Is InfoSec? Information Security Explained
Learn
10 Minute Read

What Is InfoSec? Information Security Explained

In this post, we'll provide an introduction to information security including how to assess InfoSec vulnerability and best practices.
What Is Risk Assessment? Steps, Types, and Challenges
Learn
7 Minute Read

What Is Risk Assessment? Steps, Types, and Challenges

Learn how to assess risk. See how risk assessments work and help to ensure the security of your digital assets, physical spaces, and your staff.