/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Phishing Attacks: Protecting Against Them
Learn
7 Minute Read

Phishing Attacks: Protecting Against Them

Phishing attacks exploit social engineering to deceive victims into disclosing sensitive information or installing malware.
SBOMs: Software Bill of Materials, Explained
Learn
7 Minute Read

SBOMs: Software Bill of Materials, Explained

The software bill of materials (SBOM) lists all component parts and software dependencies used in application development and delivery.
Handala’s Wiper: Threat Analysis and Detections
Security
17 Minute Read

Handala’s Wiper: Threat Analysis and Detections

Cisco Talos and the Splunk Threat Research Team provide a comprehensive analysis that expands on existing coverage of Handala's Wiper and offers unique insights.
Impact Bytes: Turning Data to Action to Fight Exploitation
Global Impact
3 Minute Read

Impact Bytes: Turning Data to Action to Fight Exploitation

Global Emancipation Network and Splunk use innovative data and AI solutions to rescue victims and change lives.
London to Paris Cycle for Prostate Cancer - Day 3
Global Impact
4 Minute Read

London to Paris Cycle for Prostate Cancer - Day 3

After days of battling the elements, technical glitches, and plenty of laughs along the way, our incredible team of Splunkers has arrived at the Eiffel Tower and managed to complete their bike ride. Read all about it here.
What Does it Take to be a Resilience Leader?
Cio Office
3 Minute Read

What Does it Take to be a Resilience Leader?

Hint: visibility, collaboration, and proactivity play key roles.
The Room Where It Happens: .conf+ Brings Together Executive Movers, Shakers and Change Makers
Cio Office
4 Minute Read

The Room Where It Happens: .conf+ Brings Together Executive Movers, Shakers and Change Makers

Listening in to CXOs from public and private sectors as they discuss today’s biggest technology trends and most pressing challenges.
Expert Guidance for Fraud Detection and Prevention
Industries
2 Minute Read

Expert Guidance for Fraud Detection and Prevention

Splunker Beverly Smart explains why your organization must be prepared to defend against fraud across your technical infrastructure.
ShrinkLocker Malware: Abusing BitLocker to Lock Your Data
Security
13 Minute Read

ShrinkLocker Malware: Abusing BitLocker to Lock Your Data

The Splunk Threat Research Team shares their findings and methodologies to aid the cybersecurity community in combating ShrinkLocker effectively.