/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Dashboard Design: Visualization Choices and Configurations
Tips & Tricks
5 Minute Read

Dashboard Design: Visualization Choices and Configurations

Getting started with dashboards or looking for a refresh on best practices? Read this blog to learn how to design and build effective Splunk dashboards to drive data insights with these helpful tips on visualization choices and configurations!
Reputational Risk Mitigation
Industries
6 Minute Read

Reputational Risk Mitigation

This blog suggests several techniques for a company to detect issues that may affect their reputation mostly from a security point of view. Splunk's Nimish Doshi explains.
What's New in Splunk AR
Platform
2 Minute Read

What's New in Splunk AR

Learn about our powerful new set of features for Splunk AR, along with the launch of Splunk AR for Android Private Preview.
This Feels Scripted: Zeek Scripting and Splunk
Security
5 Minute Read

This Feels Scripted: Zeek Scripting and Splunk

Splunker Shannon Davis shares a closer look at updated searches for detecting SpookySSL.
New Splunk APM Enhancements Help Troubleshoot Your MySQL and NoSQL Databases Faster
Observability
2 Minute Read

New Splunk APM Enhancements Help Troubleshoot Your MySQL and NoSQL Databases Faster

Splunk Observability is making it quicker and easier to troubleshoot latency in MySQL and NoSQL databases, with two new enhancements.
Inside the Mind of a ‘Rat’ - Agent Tesla Detection and Analysis
Security
12 Minute Read

Inside the Mind of a ‘Rat’ - Agent Tesla Detection and Analysis

The Splunk Threat Research Team (STRT) describes the different tactics, techniques and procedures mapped to the ATT&CK framework leveraged by the Agent Tesla remote access trojan.
The Holiday Season Is Around the Corner, Are You Ready?
Observability
2 Minute Read

The Holiday Season Is Around the Corner, Are You Ready?

With the holiday season quickly approaching, you need to ensure your alert severity levels are adjusted accordingly for all your services and KPIs.
SOC, Amore Mio! Following .italo's Tracks to a More Mature SOC
Security
2 Minute Read

SOC, Amore Mio! Following .italo's Tracks to a More Mature SOC

Recently I sat down with Enrico Maresca, CISO of .italo, to discuss their security operations strategy and double click into multiple lessons learned and best practices. Enrico shared insight into what good looks like when communicating to the Board of Directors, discussed cyber security topics and SecOps use case development strategies.
5 Cybersecurity Tips So You Can Sleep at Night
Leadership
2 Minute Read

5 Cybersecurity Tips So You Can Sleep at Night

Organizations need to be ready to respond and recover when an incident occurs. Splunk's Jason Lee shares five tips on preparing for a cyberattack.