/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Comprehensive, Continuous, and Compliant: Obtain Proactive Insights with Splunk Asset and Risk Intelligence
Security
3 Minute Read

Comprehensive, Continuous, and Compliant: Obtain Proactive Insights with Splunk Asset and Risk Intelligence

Announcing the release of the latest addition to our security product portfolio, Splunk Asset and Risk Intelligence.
Fortify Digital Resilience with Splunk + Cisco Talos Incident Response
Security
3 Minute Read

Fortify Digital Resilience with Splunk + Cisco Talos Incident Response

Announcing the availability of Cisco Talos Incident Response services to Splunk customers.
What Are Social Engineering Attacks? A Detailed Explanation
Learn
7 Minute Read

What Are Social Engineering Attacks? A Detailed Explanation

In this post, we'll explore how cybercriminals use a variety of tactics and understand how to defend against social engineering attacks.
What Are Stored Procedures?
Learn
7 Minute Read

What Are Stored Procedures?

An important feature of SQL, stored procedures greatly improve the efficiency, security, and functionality of your database. Get the full story here.
Introducing Log Observer Connect for AppDynamics
Observability
3 Minute Read

Introducing Log Observer Connect for AppDynamics

Log Observer Connect for AppDynamics enables in-context navigation between AppDynamics and Splunk. This unified observability troubleshooting experience promises to streamline problem identification, but also aligns cross-functional teams by providing shared insights into application performance issues across tools.
Announcing General Availability of Cisco Talos Intelligence in Splunk Attack Analyzer
Security
2 Minute Read

Announcing General Availability of Cisco Talos Intelligence in Splunk Attack Analyzer

We are pleased to announce the general availability of Cisco Talos threat intelligence to all Splunk Attack Analyzer customers globally.
LLM Security: Splunk & OWASP Top 10 for LLM-based Applications
Security
11 Minute Read

LLM Security: Splunk & OWASP Top 10 for LLM-based Applications

Threats to LLMs are real. Let’s look at top LLM threats and show you how, with Splunk, you can better defend LLM-based applications and their users.
Impact Bytes: Sharing Their Skills and Passions for Causes in Their Communities
Global Impact
3 Minute Read

Impact Bytes: Sharing Their Skills and Passions for Causes in Their Communities

Splunk’s Impact Bytes series highlights customers, grantees, and employees creating positive change in our local and global communities.
Setting up and Understanding OpenTelemetry Collector Pipelines Through Visualization
Observability
2 Minute Read

Setting up and Understanding OpenTelemetry Collector Pipelines Through Visualization

Splunker Greg Leffler walks us through OTelBin, a free and open-source tool created by the OpenTelemetry community.