/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Active Directory Discovery Detection: Threat Research Release, September 2021
Security
15 Minute Read

Active Directory Discovery Detection: Threat Research Release, September 2021

In this blog post, we’ll walk you through this analytic story, demonstrate how we can simulate these attacks using PoshC2 & PurpleSharp to then collect and analyze the resulting telemetry to test our detections.
Data Can Change the World: Splunk for Splunkterns
Splunk Life
3 Minute Read

Data Can Change the World: Splunk for Splunkterns

This summer, the Early Talent team partnered with Splunk for Good and the Splunk Education Ecosystem team to host the annual Splunk for Splunkterns competition. We had an all-time high of 18 teams and over 90 Splunkterns participate. The teams were asked to use Splunk to find data on social issues they are passionate about.
No Time To Die In SecOps: (00)7 Must Watch .conf21 from EMEA
.conf & .conf Go
4 Minute Read

No Time To Die In SecOps: (00)7 Must Watch .conf21 from EMEA

After planning out your SecOps, you need proper execution. Our EMEA customers at .conf21 take you through a variety of security use cases and share their experiences and best practices so you can quickly adapt and move digitization projects to a safer place.
Zero to MOPS: Q&A With Brian Goldfarb and Renaud Bizet (Part 1)
Leadership
3 Minute Read

Zero to MOPS: Q&A With Brian Goldfarb and Renaud Bizet (Part 1)

Splunk CMO Brian Goldfarb sits down for part one of a Q&A with Renaud Bizet to learn how he's helping to elevate the Splunk marketing strategy
Cloud-Driven Transformation at Washington Post Live
Leadership
1 Minute Read

Cloud-Driven Transformation at Washington Post Live

Splunk Chief Cloud Officer Sendur Sellakumar joined Washington Post Live to discuss what’s next in cloud and how to accelerate cloud-driven transformation with McKinsey & Company senior partner Steve Van Kuiken and Verizon CISO Nasrin Rezai.
Investigating GSuite Phishing Attacks with Splunk
Security
6 Minute Read

Investigating GSuite Phishing Attacks with Splunk

Splunk Threat Research Team (STRT) recently observed a phishing campaign using GSuite Drive file-sharing as a phishing vector. Learn more and deploy detections to prevent them in your environment.
The Wait is OVER... Meet Your 2021 Splunkie Award Winners!
.conf & .conf Go
1 Minute Read

The Wait is OVER... Meet Your 2021 Splunkie Award Winners!

We're excited to announce our Splunkie Award Winners ahead of this year’s virtual (and complimentary) .conf21!
Cloud Happens. Now What? Expert Interview Series
Leadership
8 Minute Read

Cloud Happens. Now What? Expert Interview Series

During the last ~18 months, cloud acceleration was a business necessity. In this new reality, organizations stopped asking “should we move to the cloud?” and found themselves facing the question: “Cloud happened. Now what?“. To answer this question, we have assembled some of the smartest experts around to focus on the intersection of business, technology and data in our bi-weekly podcast series.
Splunk and DTEX Systems Leverage Human Telemetry and Zero Trust to Mitigate Insider Risks and Account Compromise
Security
3 Minute Read

Splunk and DTEX Systems Leverage Human Telemetry and Zero Trust to Mitigate Insider Risks and Account Compromise

Splunk and DTEX Systems have partnered to offer an integrated solution that captures, analyzes and streams a single, noise-free endpoint data signal.