/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Security Breach Types: Top 10 (with Real-World Examples)
Learn
7 Minute Read

Security Breach Types: Top 10 (with Real-World Examples)

Learn how to protect your organization against rising security breaches. Explore common breach types, real-world examples, and effective prevention strategies.
The Security Detail Podcast: Exploring Cyber Threats Across Different Industries
Security
11 Minute Read

The Security Detail Podcast: Exploring Cyber Threats Across Different Industries

SURGe, Splunk’s strategic security research team, examines the cyber threat landscape across different industries in a new podcast series called The Security Detail.
Art of Data: Resilience in F1
Partners
1 Minute Read

Art of Data: Resilience in F1

As we gear up to the summer F1 races with Canada this weekend before F1 heads to Europe, we sat down with Lando Norris and new McLaren driver Oscar Piastri to discover what makes them both tick on and off the track.
The Purple Team: Combining Red & Blue Teaming for Cybersecurity
Learn
6 Minute Read

The Purple Team: Combining Red & Blue Teaming for Cybersecurity

Learn how purple teams bridge the gap between offensive and defensive security strategies, and are helping organizations identify and mitigate risks effectively
Splunk Welcomes Alexandra Turbitt as the New General Vice President of its EMEA Partner Organisation
Leadership
1 Minute Read

Splunk Welcomes Alexandra Turbitt as the New General Vice President of its EMEA Partner Organisation

Get to know Splunk's new GVP of Splunk’s EMEA Partner Organisation, Alexandra Turbitt.
Pipelines Full of Context: A GitLab CI/CD Journey
Observability
4 Minute Read

Pipelines Full of Context: A GitLab CI/CD Journey

CI/CD solutions are great. But, how can they enrich our observability practices? Find out how to leverage DevOps data from GitLab CI in Splunk.
Authentication vs. Authorization
Learn
6 Minute Read

Authentication vs. Authorization

Discover the fundamental differences between authentication and authorization, explore techniques, and best practices to implement robust security measures.
How Digital Fingerprinting Tracks, Identifies & Affects Us
Learn
4 Minute Read

How Digital Fingerprinting Tracks, Identifies & Affects Us

Everything you do on the internet leaves behind pieces of data, these make up your digital fingerprint. Here's what to know about managing your privacy online.
Detecting DNS Exfiltration with Splunk: Hunting Your DNS Dragons
Security
7 Minute Read

Detecting DNS Exfiltration with Splunk: Hunting Your DNS Dragons

DNS data is an all-too-common place for threats. Find out how to use Splunk to hunt for threats in your DNS. We will slay those DNS dragons.