/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Continual Learning in AI: How It Works & Why AI Needs It
Learn
3 Minute Read

Continual Learning in AI: How It Works & Why AI Needs It

Learning is easy for humans, and a lot more difficult for artificial intelligence. Learn all about the concept of continual learning here.
Splunk at Black Hat 2024: Strategic Transformations to Power the SOC of the Future
Security
3 Minute Read

Splunk at Black Hat 2024: Strategic Transformations to Power the SOC of the Future

At Black Hat 2024, Splunk will demonstrate how we’re empowering security teams to embrace strategic transformations and navigate the complex threat landscape.
What Is Cyber Forensics?
Learn
5 Minute Read

What Is Cyber Forensics?

Cyber forensics is getting information, analyzing it, and gaining intelligence about criminal activities involving technology. Learn how it's done here.
What’s EDR? Endpoint Detection & Response
Learn
5 Minute Read

What’s EDR? Endpoint Detection & Response

Learn how Endpoint Detection and Response secures endpoints and detects hidden threats to help organizations achieve better cybersecurity.
Announcing the Splunk SPL to SPL2 Converter
Platform
3 Minute Read

Announcing the Splunk SPL to SPL2 Converter

Introducing Splunk’s SPL to SPL2 converter, now available for Splunk Data Management‘s Edge Processor and Ingest Processor.
Introducing Ingest Processor: An Evolution in Splunk Data Management
Platform
2 Minute Read

Introducing Ingest Processor: An Evolution in Splunk Data Management

Splunk is pleased to announce the general availability of Ingest Processor, a Splunk-hosted offering within Splunk Cloud Platform designed to help customers achieve greater efficiencies in data transformation and improved visibility into data in motion.
Visualising Network Patterns with Splunk and Graphistry
Tips & Tricks
7 Minute Read

Visualising Network Patterns with Splunk and Graphistry

One of the best ways to understand what is happening in the environment for security, observability or any other use case is to visualise the data. Network data is vital since it tells us how systems are connected and understanding it uplifts resiliency across the organisation. In this blog post, we use the Splunk App for Data Science and Deep Learning (DSDL) and Graphistry to visualise network data to represent the current state of the environment. Deep understanding of the network can help us identify and stop security threats earlier and improve application performance.
From Espionage to Sabotage: The Shifting Strategies of Global Cyber Conflict
Ciso Circle
2 Minute Read

From Espionage to Sabotage: The Shifting Strategies of Global Cyber Conflict

Cyber sabotage is on the rise. Strengthening cybersecurity measures across sectors with sensitive infrastructure is becoming more crucial.
How to Test a User Workflow To Resolve Issues Before Impact
Observability
6 Minute Read

How to Test a User Workflow To Resolve Issues Before Impact

Splunk Synthetic Monitoring helps test your most important user workflows so that you can find and fix issues before real users are impacted.