/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Unified Strategies Across IT and Security for Cutting-Edge Detection, Investigation and Response
Security
4 Minute Read

Unified Strategies Across IT and Security for Cutting-Edge Detection, Investigation and Response

Splunk's Mike Horn shares a closer look at the value of a unified approach to security and observability.
Surprising Lessons Technical Leaders Can Learn From Pit Crews
Cio Office
5 Minute Read

Surprising Lessons Technical Leaders Can Learn From Pit Crews

Discover how the high-octane strategies of Formula 1 pit crews can fuel your technical teams’ performance, rev up precision and drive collaboration.
Code, Coffee, and Unity: How a Unified Approach to Observability and Security Empowers ITOps and Engineering Teams
Observability
3 Minute Read

Code, Coffee, and Unity: How a Unified Approach to Observability and Security Empowers ITOps and Engineering Teams

Splunk's Spiros Xanthos explores the pivotal role that a unified security and observability approach plays in empowering ITOps and engineering teams to ensure digital resilience faster.
Cloud Security and Data Resilience in Government
Industries
4 Minute Read

Cloud Security and Data Resilience in Government

A review of the legislative and policy landscape regarding cloud security and data resilience.
Detecting Lateral Movement Using Splunk User Behavior Analytics
Security
8 Minute Read

Detecting Lateral Movement Using Splunk User Behavior Analytics

The blog is to introduce lateral movement detection using Splunk User Behavior Analytics (UBA)
Splunk’s 2025 HBCU Academic Scholarship
Splunk Life
4 Minute Read

Splunk’s 2025 HBCU Academic Scholarship

Splunk is delighted to offer the Splunk HBCU Academic Scholarship for 2025.
Developing the Splunk App for Anomaly Detection
Platform
13 Minute Read

Developing the Splunk App for Anomaly Detection

A technical overview of the Splunk App for Anomaly Detection, which uses machine learning to automatically configure anomaly detection jobs on time series data.
Integrated Intelligence Enrichment With Threat Intelligence Management
Security
1 Minute Read

Integrated Intelligence Enrichment With Threat Intelligence Management

Threat Intelligence Management enables analysts to fully investigate security events or suspicious activity by providing the relevant and normalized intelligence to better understand threat context and accelerate time to triage.
The Security Detail Download: Cyber Threats to the Manufacturing Sector
Industry Insights
2 Minute Read

The Security Detail Download: Cyber Threats to the Manufacturing Sector

Tim Chase, Program Director at the Global Resilience Federation, joins this week’s podcast to discuss the threats he’s seeing in manufacturing.