/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Splunk Becomes a TISAX Participant
Industries
4 Minute Read

Splunk Becomes a TISAX Participant

With increasing focus on implementing security standards within the digital supply chain, national and industry-specific certifications have become increasingly important. Today, we are excited to announce that Splunk Services Germany GmbH has become a TISAX participant.
The Public Sector's Worst Nightmare: Fraud
Industries
2 Minute Read

The Public Sector's Worst Nightmare: Fraud

In this post, we’ll dive deeper into how much fraud affects the public sector.
Password Spraying Attacks: What You Need To Know To Prevent Attacks
Learn
6 Minute Read

Password Spraying Attacks: What You Need To Know To Prevent Attacks

Password spraying remains a threat today, despite improvements in password safety and privacy. Read all about this attack tactic in order to prevent it.
Planning for Success with Risk-Based Alerting
Security
4 Minute Read

Planning for Success with Risk-Based Alerting

In our last RBA blog post, we talked about some of the problems RBA can help solve. In this post, we explain the methodology we use with Splunk customers as their security teams start working with RBA.
Machine Learning in Security: Detect Suspicious TXT Records Using Deep Learning
Security
8 Minute Read

Machine Learning in Security: Detect Suspicious TXT Records Using Deep Learning

The Splunk Machine Learning for Security (SMLS) team introduces a new detection to detect DNS Tunneling using DNS TXT payloads.
Data Governance vs. Data Management: What's The Difference?
Learn
6 Minute Read

Data Governance vs. Data Management: What's The Difference?

Understanding the difference between data governance and data management is paramount in any setting where you’re managing (and monetizing) data.
Technical Education Can Drive Long Term Success for Organizations
Customers & Community
1 Minute Read

Technical Education Can Drive Long Term Success for Organizations

Technical education is critical to driving digital transformation and on going business resilience for customers at any point in their data journey.
The Security Analyst Role: Skills, Responsibilities & Salary
Learn
6 Minute Read

The Security Analyst Role: Skills, Responsibilities & Salary

Security analysts are modern day detectives, seeking out threats and incidents before they become major problems. Learn all about the role, including $$, here.
What's Security Monitoring in Cybersecurity?
Learn
4 Minute Read

What's Security Monitoring in Cybersecurity?

Do it all! Security Monitoring is the catch-all name for the process of detecting threats and managing security incidents. Get the latest and greatest for security monitoring today.