/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Threat Assessments & How To Assess a Cyberthreat
Learn
3 Minute Read

Threat Assessments & How To Assess a Cyberthreat

To respond to threats effectively, you need to understand what damage that threat can cause. Threat assessments are a crucial part of any cybersecurity strategy.
The Endless Possibilities of Diverse Thinking
Splunk Life
2 Minute Read

The Endless Possibilities of Diverse Thinking

Splunk's Tom Casey reflects on what it means to be neurodivergent and how valuable it is to include people with different brains.
Don’t Live in the Past - APM 3.0 and Why You Need It
Observability
11 Minute Read

Don’t Live in the Past - APM 3.0 and Why You Need It

Application Performance Monitoring (APM) as a discipline and as a collection of supporting technologies has evolved rapidly since a distinct recognisable market for APM products first emerged in the 2007 - 2008 time frame. While there are many who would argue that APM has mutated into or been replaced by Observability, it makes more sense to see APM as one of many possible use cases now able to exploit the functionalities that Observability brings to the table - particularly when combined with AI.
Incident Review: How To Conduct Incident Reviews & Postmortems
Learn
5 Minute Read

Incident Review: How To Conduct Incident Reviews & Postmortems

Reviewing incidents or doing an “incident postmortem” helps your team learn from incidents. Learn the best ways to maximize the value in your incident review practice.
Racing at the Speed of Data: What It Takes to Win in the World of Formula 1
Cio Office
1 Minute Read

Racing at the Speed of Data: What It Takes to Win in the World of Formula 1

Data shapes everything from the production line to the pulse-pounding moments on the track.
It Takes a Village: Why Security Teams Won’t Achieve Resilience Without Collaboration
Ciso Circle
4 Minute Read

It Takes a Village: Why Security Teams Won’t Achieve Resilience Without Collaboration

To navigate the sea of cyber legislation, disruptive technologies and security threats, teams must realize they’re on the same mission.
Business Process Reengineering Explained
Learn
6 Minute Read

Business Process Reengineering Explained

Let’s face it: processes at work don’t always work. Business process reengineering helps you stay on top of constant change while still accomplishing your most important goals.
What is Data Center Security?
Learn
7 Minute Read

What is Data Center Security?

Get started with data center security (on-premises and cloud), including what it encompasses, how to secure data centers and important standards to consider.
Detecting & Hunting Named Pipes: A Splunk Tutorial
Security
12 Minute Read

Detecting & Hunting Named Pipes: A Splunk Tutorial

Named pipes can be threats, too. In this comprehensive article, we are going to talk about detecting, hunting and investigating named pipes.