/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Building Large-Scale User Behavior Analytics: Data Validation and Model Monitoring
Security
6 Minute Read

Building Large-Scale User Behavior Analytics: Data Validation and Model Monitoring

Splunk's Cui Lin explores fundamental techniques to validate data volume and monitor models to understand the size of your own UBA clusters.
5 Ingredients for a Robust Cybersecurity Culture
Ciso Circle
3 Minute Read

5 Ingredients for a Robust Cybersecurity Culture

Shefali Mookencherry, Chief Information Security & Privacy Officer at the University of Illinois-Chicago, shares insights from the two decades she’s spent in cybersecurity and higher education.
ManpowerGroup’s Unique Approach to Resilience with Splunk
Customers & Community
2 Minute Read

ManpowerGroup’s Unique Approach to Resilience with Splunk

CEO of The Futurum Group Daniel Newman sat down with Randy Herold, CISO & Chief Privacy Office of ManpowerGroup, to talk building digital resilience with Splunk.
AI Predictions Are Fueling Greater Cyber Up-Skilling Needs
Customers & Community
2 Minute Read

AI Predictions Are Fueling Greater Cyber Up-Skilling Needs

Use our new Splunk Education e-book to guide the cybersecurity learning journey in this AI-dominated era.
A Coming-of-Age Brand Story
Splunk Life
3 Minute Read

A Coming-of-Age Brand Story

Splunk, meet your refresh – Splunker Adam Morgan shares his insights on the latest evolution of the Splunk brand.
Behind the Scenes with the Splunk Brand Refresh
Splunk Life
7 Minute Read

Behind the Scenes with the Splunk Brand Refresh

Splunker Adam Morgan shares a behind-the-scenes look at Splunk's recent brand refresh.
Another Year of RATs and Trojan Stealer: Detection Commonalities and Summary
Security
9 Minute Read

Another Year of RATs and Trojan Stealer: Detection Commonalities and Summary

The Splunk Threat Research Team shares analysis, analytic stories and security detections for seven well-known RAT and Trojan Stealer malware families.
Homomorphic Encryption: How It Works
Learn
3 Minute Read

Homomorphic Encryption: How It Works

Homomorphic encryption is a new way to protect data. Learn how homomorphic encryption reduces certain problems inherent in traditional decryption.
How Tech Executives Can Support Gender Diverse Cyber Talent
Security
4 Minute Read

How Tech Executives Can Support Gender Diverse Cyber Talent

The number of unfilled cybersecurity roles creates a perfect opportunity for leaders to attract female talent at their organizations.