/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Elevate Your Security Program with Splunk and Tenable
Partners
4 Minute Read

Elevate Your Security Program with Splunk and Tenable

Tenable and Splunk built an integration that combines security logs, behavioral data and threat intelligence from Splunk with cyber exposure insights—data on assets, vulnerabilities, misconfigurations and unpatched components—from Tenable.
Meet the Splunktern: Joline Cheng
Splunk Life
4 Minute Read

Meet the Splunktern: Joline Cheng

In this next installment of our "Meet the Splunktern" series, we're featuring Joline Cheng, Software Engineer In Test (QA) Intern in Santana Row. Joline is a third year student at the University of Waterloo majoring in data science. Read on to learn more about Joline’s experience at Splunk!
Administer Your Splunk Cloud Stacks Easily and Efficiently with ACS Helper for Splunk
Tips & Tricks
2 Minute Read

Administer Your Splunk Cloud Stacks Easily and Efficiently with ACS Helper for Splunk

Administer your Splunk Cloud instances more easily with ACS Helper for Splunk. This free app is now available on Splunkbase.
SQL vs. NoSQL Today: Databases, Differences & When To Use Which
Learn
7 Minute Read

SQL vs. NoSQL Today: Databases, Differences & When To Use Which

Trying to decide on the right database type? SQL and NoSQL each have their own pros and cons, from relational to schema-less, to vertical and horizontal scaling.
SOC Metrics: Security Metrics & KPIs for Measuring SOC Success
Learn
8 Minute Read

SOC Metrics: Security Metrics & KPIs for Measuring SOC Success

Maintaining a keen eye on SOC success is critical in any security operation. Join us as we discuss common KPIs, and how to leverage metrics for improvement.
Outputs vs. Outcomes: Understanding the Differences
Learn
4 Minute Read

Outputs vs. Outcomes: Understanding the Differences

Measuring success is no small equation: correctly assessing outputs versus outcomes can help us get it right. Join us to explore the key differences between the two.
Red Teams vs. Blue Teams: What’s The Difference?
Learn
10 Minute Read

Red Teams vs. Blue Teams: What’s The Difference?

Effective cybersecurity is a group effort - better yet, a multi-group effort. Learn how the Red Team Blue Team approach tackles security from both angles.
Model-Assisted Threat Hunting (M-ATH) with the PEAK Framework
Security
9 Minute Read

Model-Assisted Threat Hunting (M-ATH) with the PEAK Framework

Welcome to the third entry in our introduction to the PEAK Threat Hunting Framework! Taking our detective theme to the next level, imagine a tough case where you need to call in a specialized investigator. For these unique cases, we can use algorithmically-driven approaches called Model-Assisted Threat Hunting (M-ATH).
Trust Unearned? Evaluating CA Trustworthiness Across 5 Billion Certificates
Security
10 Minute Read

Trust Unearned? Evaluating CA Trustworthiness Across 5 Billion Certificates

In this blog post, we dive into our recent research project, in which the Splunk SURGe team analyzed more than five billion TLS certificates to find out if the CAs we rely on are really worthy of our trust.