/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Splunk in One Word
Customers & Community
1 Minute Read

Splunk in One Word

In celebration of Customer Experience Day 2024, we share a closer look at how our customers perceive and describe Splunk.
Data Pipelines & Optimizing Pipeline Efficiency
Learn
10 Minute Read

Data Pipelines & Optimizing Pipeline Efficiency

Data pipelines: everyone has one, but exactly what are they? We're telling the full story here, including why data pipelines are only growing in importance.
Snort Rules 101: Examples & Use Cases for Snort Network Defense
Learn
5 Minute Read

Snort Rules 101: Examples & Use Cases for Snort Network Defense

Learn how Snort rules enhance network defense by identifying and blocking potential threats, providing customizable protection against evolving cyberattacks.
Tipping the Balance: The Power of Automated Cyber Defense Federations
Ciso Circle
5 Minute Read

Tipping the Balance: The Power of Automated Cyber Defense Federations

Defending in isolation is like trying to solve the mysteries of the universe solo—automated cyber defense federations are the only way to keep pace with today’s cosmic-scale cyber threats.
Splunk Cloud Attains FedRAMP High Authorization
Industries
2 Minute Read

Splunk Cloud Attains FedRAMP High Authorization

Splunk is proud to announce that Splunk Cloud Platform has received FedRAMP authorization at a High impact level from the General Services Administration (GSA) FedRAMP Program Management Office (PMO).
Outside the Box: How the Public Sector Is Addressing Talent Shortfalls
Industry Insights
5 Minute Read

Outside the Box: How the Public Sector Is Addressing Talent Shortfalls

The public sector is turning talent shortfalls into a talent show, using student SOCs, AI, and innovative partnerships to hit the high notes in cybersecurity recruitment and retention.
Information vs. Operational Technology: IT vs. OT Explained
Learn
4 Minute Read

Information vs. Operational Technology: IT vs. OT Explained

Explore the differences between IT and OT, their roles in cybersecurity, and how their convergence is reshaping industrial efficiency and safeguarding critical systems.
What Is Lateral Movement?
Learn
4 Minute Read

What Is Lateral Movement?

Lateral movement is one way threat actors can exploit your protected systems and networks. Get the full story here.
Put Your Issue Detection and Response on Fast-Forward With GenAI
Observability
4 Minute Read

Put Your Issue Detection and Response on Fast-Forward With GenAI

In this blog, Splunkers Joanna Zouhour and Umang Agarwal cover three use cases the AI Assistant can unlock: accelerated troubleshooting, deeper visibility of your tech stack, and faster daily operations.