/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Top 10 AI Trends 2025: How Agentic AI and MCP Changed IT
Artificial Intelligence
5 Minute Read

Top 10 AI Trends 2025: How Agentic AI and MCP Changed IT

Explore the top 10 AI trends of 2025—from agentic AI and Model Context Protocol (MCP) to self-healing systems—and see what to expect for AI in 2026.
Preemptive Cybersecurity in 2026: How It Works
Learn
4 Minute Read

Preemptive Cybersecurity in 2026: How It Works

Stop cyberattacks before they gain a foothold. Discover how preemptive cybersecurity uses the "3 D's"—Deny, Deceive, and Disrupt—to neutralize AI-driven threats.
Swiss Army LLMs Won’t Protect You. Purpose-Built Cybersecurity AI Will.
Ciso Circle
8 Minute Read

Swiss Army LLMs Won’t Protect You. Purpose-Built Cybersecurity AI Will.

Discover why purpose-built cybersecurity AI outperforms generalist LLMs for security tasks. Learn how specialized models deliver precision, compliance, and real-time protection.
What Is OPSEC? Operations Security and How It Works
Learn
4 Minute Read

What Is OPSEC? Operations Security and How It Works

Operations security (OPSEC) helps organizations prevent adversaries from gaining actionable insight by protecting sensitive operational information across systems and processes.
Service Level Management & Monitoring
Learn
6 Minute Read

Service Level Management & Monitoring

Service level management practice helps to set and manage a shared view of the quality of services between the service provider and the service consumer.
TOTAL-REPLAY: The Bridge to Replay Attacks Using the Security Content Metadata
Security
5 Minute Read

TOTAL-REPLAY: The Bridge to Replay Attacks Using the Security Content Metadata

Learn how to use TOTAL-REPLAY to replay Splunk Attack Data logs. Validate detections, tune analytics, and map to MITRE ATT&CK without a full attack lab.
Print, Leak, Repeat: UEBA Insider Threats You Can't Ignore
Security
5 Minute Read

Print, Leak, Repeat: UEBA Insider Threats You Can't Ignore

UEBA excels at identifying small deviations in user and device behavior across authentication, data access, data movement, and privilege usage.
Splunking Isovalent Data: Initial Setup and Overview
Security
5 Minute Read

Splunking Isovalent Data: Initial Setup and Overview

The Splunk Threat Research Team walks through the lab setup, Splunk data ingestion, and initial exploration of Tetragon logs to establish our foundation.
Top 10 Splunk Things To Do at Cisco Live in Amsterdam
Platform
20 Minute Read

Top 10 Splunk Things To Do at Cisco Live in Amsterdam

Cisco Live offers innovation-packed keynotes, technical training, and professional networking.