/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Intrusion Detection Systems (IDS): Definition, Types, Purpose
Learn
6 Minute Read

Intrusion Detection Systems (IDS): Definition, Types, Purpose

An intrusion detection system monitors network traffic for anomalies and cyberattacks. Learn what types of IDS there are and which is right for you.
Previous Security Content Roundups from the Splunk Threat Research Team (STRT)
Security
12 Minute Read

Previous Security Content Roundups from the Splunk Threat Research Team (STRT)

Recap: Learn about the last four quarters of security content from the Splunk Threat Research Team.
The Final Shell: Introducing ShellSweepX
Security
8 Minute Read

The Final Shell: Introducing ShellSweepX

The Splunk Threat Research Team is excited to announce the final tool in the ShellSweep collection: ShellSweepX.
RBAC: Role-Based Access Controls, Explained
Learn
5 Minute Read

RBAC: Role-Based Access Controls, Explained

Learn how role-based access controls restrict users to their roles and secure confidential data.
London to Paris Cycle for Prostate Cancer
Global Impact
5 Minute Read

London to Paris Cycle for Prostate Cancer

In this limited blog series, we will be using Splunk to track a group of intrepid Splunkers as they cycle from London to Paris, raising awareness about prostate cancer and supporting organisations.
How Generative AI Will — And Won’t — Solve the Cyber Talent Gap
Ciso Circle
3 Minute Read

How Generative AI Will — And Won’t — Solve the Cyber Talent Gap

Generative AI might ease the cybersecurity talent crunch, but relying on it too much could leave your SOC with more bots than brains.
How Leaders Can Ease the Growing Pains of Generative AI for Their Workforce
Cto Stack
1 Minute Read

How Leaders Can Ease the Growing Pains of Generative AI for Their Workforce

Generative AI will ignite a deep shift in the workforce, and leaders can adapt by reprioritizing and adjusting employees’ skill sets.
Cross-Site Scripting (XSS) & How to Prevent Attacks
Learn
6 Minute Read

Cross-Site Scripting (XSS) & How to Prevent Attacks

Learn about Cross Site Scripting (XSS) attacks and how they work. Check out its examples, types, impacts, and ways to prevent it.
What's GRC? Governance, Risk & Compliance Explained
Learn
8 Minute Read

What's GRC? Governance, Risk & Compliance Explained

GRC ensures organizations meet third-party requirements while still hitting high-performance goals. Learn what it is and how to implement it.