/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Cybersecurity Awareness Is Not Just for Spooky Season
Security
3 Minute Read

Cybersecurity Awareness Is Not Just for Spooky Season

As October marks Cybersecurity Awareness Month, Splunker Mick Baccio reflects on the progress made over the past two decades.
Introduction to Runbooks
Learn
4 Minute Read

Introduction to Runbooks

Runbooks provide step-by-step IT guidelines, streamlining tasks, reducing errors, and enhancing efficiency, consistency, and automation in daily operations.
Why It’s Important to Brush Your Teeth: Refocusing on Cybersecurity Fundamentals in the Era of AI
Ciso Circle
4 Minute Read

Why It’s Important to Brush Your Teeth: Refocusing on Cybersecurity Fundamentals in the Era of AI

Why basic cyber hygiene gets overlooked — and why we can't afford to any longer.
Security for Industrial Control Systems (ICS)
Learn
5 Minute Read

Security for Industrial Control Systems (ICS)

Industrial Control Systems (ICS) Security is defined as the defense of systems that govern industrial processes. Get the full picture here.
What Is SecOps? Security Operations Defined
Learn
7 Minute Read

What Is SecOps? Security Operations Defined

Security Operations, or SecOps, covers practically every aspect of security & IT operations. Get the latest on what SecOps means today, all right here.
Splunking GenAI Applications for Observability Insights
Artificial Intelligence
1 Minute Read

Splunking GenAI Applications for Observability Insights

Splunker Jeff Wiedemann explains how Splunk Observability Cloud allows you to instrument GenAI apps to gain critical observability insights.
What Is Adaptive AI? Definition & Use Cases
Learn
7 Minute Read

What Is Adaptive AI? Definition & Use Cases

Adaptive artificial intelligence (AI) is the next generation of AI systems. It can adjust its code for real-world changes.
An Introduction to Threat Monitoring
Learn
5 Minute Read

An Introduction to Threat Monitoring

Discover threat monitoring, its importance in combating rising cyber risks, top tools, best practices, and how AI enhances real-time protection for your business.
My CUPS Runneth Over (with CVEs)
Security
11 Minute Read

My CUPS Runneth Over (with CVEs)

This blog dissects the technical intricacies of the CUPS vulnerability, explores its potential impact on affected systems, and provides detection opportunities and mitigation strategies.