/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

SOAR: Security Orchestration, Automation & Response
Learn
7 Minute Read

SOAR: Security Orchestration, Automation & Response

SOAR revolutionizes how security operations teams manage, analyze and respond to alerts and threats. Learn what a modern SOAR solution is — and isn't.
Unmasking the Enigma: A Historical Dive into the World of PlugX Malware
Security
8 Minute Read

Unmasking the Enigma: A Historical Dive into the World of PlugX Malware

The Splunk Threat Research Team (STRT) unravels the mystery of a PlugX variant, peeling back the layers of its payload, tactics, and impact on the digital realm.
Why Is Log Data So Important In Observability?
Observability
8 Minute Read

Why Is Log Data So Important In Observability?

Traditional monitoring approaches struggle in digital platforms and they do not collect the rich data contained in the logs. Observability, with OpenTelemetry, is the key to managing these platforms and it is based on the capture and analysis of three types of telemetry; metrics, traces and logs.
2024 Predictions: AI Innovation Meets Digital Resilience
Leadership
4 Minute Read

2024 Predictions: AI Innovation Meets Digital Resilience

Splunk’s 2024 Predictions features three editions – Executive, Security and Observability – sharing insights and strategies for the era of AI.
User Behavior Monitoring with M-21-31
Security
6 Minute Read

User Behavior Monitoring with M-21-31

OMB M-21-31 requires US Federal Civilian agencies to implement user behavior monitoring. We'll explain what that means and how to do it right.
Conway’s Law Explained
Learn
4 Minute Read

Conway’s Law Explained

In business, Conway's Law says: your business outcomes will be a direct reflection of your company's internal structure — good or bad. Read more here.
The Hidden Foundation of AI That Many Tech Leaders May Overlook
Ciso Circle
4 Minute Read

The Hidden Foundation of AI That Many Tech Leaders May Overlook

Leaders will miss out on the real potential of AI unless they can get a handle on one critical thing. Former CISO and Chief Digital Trust Officer Mike Towers weighs in.
CIO Roundtable: Harnessing GenAI for Resilient Security and Observability – Insights and Strategies
Security
2 Minute Read

CIO Roundtable: Harnessing GenAI for Resilient Security and Observability – Insights and Strategies

Get insights from a recent roundtable discussion in collaboration with CIO magazine. The talk focused on the dual challenge faced by IT and security managers: mitigating risks associated with AI while leveraging AI to enhance organizational capability.
Detecting Dubious Domains with Levenshtein, Shannon & URL Toolbox
Security
6 Minute Read

Detecting Dubious Domains with Levenshtein, Shannon & URL Toolbox

Got some parsed fields that you're ready to analyze... possibly for threat hunting? We'll use Levenshtein, Shannon & URL Toolbox to show you how!