/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Modern C2 Attacks: Detect & Defend Command-and-Control
Learn
7 Minute Read

Modern C2 Attacks: Detect & Defend Command-and-Control

Learn how command-and-control (C2) attacks work, including emerging stealth techniques, real-world examples, and modern detection using AI and behavioral analysis.
SOC Automation: How To Automate Security Operations without Breaking Things
Learn
9 Minute Read

SOC Automation: How To Automate Security Operations without Breaking Things

Automating SOC activities is a must. Learn what SOC automation means, how much you can automate (and how), and where humans must stay in the loop.
Splunk Security Content for Threat Detection & Response: September Recap
Security
2 Minute Read

Splunk Security Content for Threat Detection & Response: September Recap

Splunk's September ESCU update: New security content & analytics for robust threat detection. Covers Cisco ASA, ArcaneDoor, diverse malware, and Office365 Copilot activity.
From Insight to Action: Transforming Customer Experience with Splunk
Customers & Community
1 Minute Read

From Insight to Action: Transforming Customer Experience with Splunk

With Splunk, teams can innovate, adapt faster, and grow their skills more rapidly to challenge the norm and enable them to quickly find solutions to customer problems through valuable data insights.
Splunk in Action: How Splunk Enables Better Outcomes for Organizations
Customers & Community
1 Minute Read

Splunk in Action: How Splunk Enables Better Outcomes for Organizations

Splunk is a powerful tool that our customers use in a variety of ways across their security, observability and platform environments, correlating into driving better business outcomes.
Splunk Summed Up: How Our Customers Describe Splunk in One Word
Customers & Community
1 Minute Read

Splunk Summed Up: How Our Customers Describe Splunk in One Word

What is the first thought that comes to mind when you think about describing Splunk in one word? Hear what our customers had to say.
Unlocking Possibilities: How Customers Use Splunk for Security and IT Success
Customers & Community
1 Minute Read

Unlocking Possibilities: How Customers Use Splunk for Security and IT Success

With Splunk, there are endless possibilities and use cases for customers to utilize across their environments – and this is what makes Splunk so valuable to their organizations.
Real-Time Data: An Overview and Introduction
Learn
8 Minute Read

Real-Time Data: An Overview and Introduction

Unlock the power of real-time data to drive instant decisions, improve customer experiences, and gain a competitive edge with the right data architecture.
Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler
Security
4 Minute Read

Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

As of Splunk Enterprise 10.0, mTLS is now supported across 10 essential communication paths in your deployment—from forwarders and HTTP Event Collector (HEC) to clustered search heads and indexers.