/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Add To Chrome? - Part 4: Threat Hunting in 3-Dimensions: M-ATH in the Chrome Web Store
Security
5 Minute Read

Add To Chrome? - Part 4: Threat Hunting in 3-Dimensions: M-ATH in the Chrome Web Store

SURGe experiments with a method to find masquerading using M-ATH with Splunk and the DSDL App.
Detect Money Laundering, Healthcare Fraud, and Unemployment Fraud with the New Version of the Splunk App for Fraud Analytics
Security
4 Minute Read

Detect Money Laundering, Healthcare Fraud, and Unemployment Fraud with the New Version of the Splunk App for Fraud Analytics

Detect money laundering, healthcare fraud, and unemployment fraud with Splunk App Fraud Analytics 1.2.4.
Driving a Culture of Agility and Curiosity: Strategic Approaches From McLaren F1’s COO
Cto Stack
1 Minute Read

Driving a Culture of Agility and Curiosity: Strategic Approaches From McLaren F1’s COO

McLaren F1’s COO discusses how to encourage innovation and drive resilience across your operations.
Staff Picks for Splunk Security Reading February 2024
Security
3 Minute Read

Staff Picks for Splunk Security Reading February 2024

The Splunk security team shares a curated list of presentations, whitepapers, and customer case studies they feel are worth a read.
Top 5 Outcomes CIOs Need to Accomplish by 2025: Driving Business Value Through Technology
Observability
3 Minute Read

Top 5 Outcomes CIOs Need to Accomplish by 2025: Driving Business Value Through Technology

Splunker Todd DeCapua shares five key outcomes CIOs should focus on when it comes to their technology investments.
Beyond Logs: Navigating Entity Behavior in Splunk Platform
Security
7 Minute Read

Beyond Logs: Navigating Entity Behavior in Splunk Platform

Master internal threat detection with Splunk's anomaly detection, finding events like unusual geolocations and spikes in activity, while optimizing security.
Unveiling Phemedrone Stealer: Threat Analysis and Detections
Security
11 Minute Read

Unveiling Phemedrone Stealer: Threat Analysis and Detections

The Splunk Threat Research Team dissects the Phemedrone Stealer.
Add to Chrome? - Part 3: Findings and Recommendations
Security
5 Minute Read

Add to Chrome? - Part 3: Findings and Recommendations

SURGe explores findings and general recommendations on whether or not you should click 'Add to Chrome' the next time you find a fancy new extension.
Manufacturers Hate False Promises. Here’s How to Keep Net Zero From Becoming One.
Industry Insights
3 Minute Read

Manufacturers Hate False Promises. Here’s How to Keep Net Zero From Becoming One.

Where manufacturing leaders should start on their path to net-zero, from Ewald Munz, Head of Manufacturing, Automotive and Sustainability EMEA at Splunk.