/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

What's New: Splunk Enterprise 8.2
Platform
3 Minute Read

What's New: Splunk Enterprise 8.2

Learn about the new capabilities in Splunk Enterprise 8.2! We have focused our development offers across a number of themes: insights, admin productivity, data infrastructure, and performance.
The Hidden Cost of Sampling in Observability
Observability
4 Minute Read

The Hidden Cost of Sampling in Observability

If your observability platform makes you sample, you may be drawing incorrect conclusions from it – resulting in large hidden costs and consequences. Learn more about how you can avoid missing out on critical insights at the most relevant time.
Splunk and Public Safety
Industries
6 Minute Read

Splunk and Public Safety

With the Splunk platform, public safety agencies can easily make sense of large volumes of data, from any source regardless of format, type, rate or volume, to gain real-time, enterprise-wide visibility, to make fast and confident decisions, and securely share intelligence across agencies enhancing collaboration, trust and program success.
Monitoring Model Drift in ITSI
Observability
4 Minute Read

Monitoring Model Drift in ITSI

In this blog we will talk about some strategies for monitoring your models in ITSI for model drift. This is the idea that the predictive models will become less accurate over time as the rules that were generated originally no longer match the data they are applied to.
Bringing Data to Every Part of Your Organization at SplunkLive! Virtual
.conf & .conf Go
1 Minute Read

Bringing Data to Every Part of Your Organization at SplunkLive! Virtual

SplunkLive! Virtual is coming soon, and Splunk's Lisa Palmer has all the details about what's in store for this year's event.
A Threat As Old As The Internet: Why We Still Care About Malware (And Why You Should Too)
Security
3 Minute Read

A Threat As Old As The Internet: Why We Still Care About Malware (And Why You Should Too)

Splunk's CISO Yassir Abousselham dives into why — as IT and security leaders — we need to come up with comprehensive strategies to specifically mitigate malware attacks.
Threat Hunter Intelligence Report
Security
1 Minute Read

Threat Hunter Intelligence Report

Welcome to Splunk’s Threat Hunter Intelligence Report, a monthly series brought to you by Splunk’s threat hunting and intelligence (THI) team sharing the latest cybersecurity threats and trends to help organizations stay one step ahead of adversaries, one report at a time.
The DarkSide of the Ransomware Pipeline
Security
8 Minute Read

The DarkSide of the Ransomware Pipeline

Learn about the Colonial Pipeline ransomware attack and how you can start detecting and remediating DarkSide's activities and attack using Splunk.
TruSTAR Intel Workflows Series: Automating Data Workflows to Unlock Investments in SIEM, SOAR and XDR
Security
3 Minute Read

TruSTAR Intel Workflows Series: Automating Data Workflows to Unlock Investments in SIEM, SOAR and XDR

We recently introduced TruSTAR Intel Workflows.This blog series explains our motivations for building this feature, how it works, and how users can better inform security operations. This is Part 2: How TruSTAR Intel Workflows Work.