/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Picture Paints a Thousand Codes: Dissecting Image-Based Steganography in a .NET (Quasar) RAT Loader
Security
13 Minute Read

Picture Paints a Thousand Codes: Dissecting Image-Based Steganography in a .NET (Quasar) RAT Loader

Uncover how to identify malicious executable loaders that use steganography to deliver payloads such as Quasar RAT.
Using RAG, Splunk ES Content Update App (ESCU), and MLTK to Develop, Enhance, and Analyze Splunk Detections
Artificial Intelligence
5 Minute Read

Using RAG, Splunk ES Content Update App (ESCU), and MLTK to Develop, Enhance, and Analyze Splunk Detections

Learn how to enhance Splunk security detections using a local Llama3 LLM, RAG, MLTK, and ESCU.
Mission Control for Modern Risk
Ciso Circle
6 Minute Read

Mission Control for Modern Risk

Discover how fusion centers merge cyber, fraud, and ops data into a mission‑control view. Automate response, and reduce risk faster than siloed teams.
The Splunk Platform Track at .conf25: 10 Sessions You Can't Miss
.conf & .conf Go
3 Minute Read

The Splunk Platform Track at .conf25: 10 Sessions You Can't Miss

Explore the Splunk Platform Track at .conf25! Discover 83 sessions on AI, data management, and digital resilience, including Cisco integrations. Accelerate your Splunk value.
Leveraging Machine Learning, Splunk Enterprise, the Splunk Edge Hub and MQTT for Data Integration
Partners
5 Minute Read

Leveraging Machine Learning, Splunk Enterprise, the Splunk Edge Hub and MQTT for Data Integration

Leverage existing hardware to build new datasets and insights with the combined power of the Splunk Platform and Cisco Meraki.
What is ABAC? Attribute Based Access Controls, Explained
Learn
5 Minute Read

What is ABAC? Attribute Based Access Controls, Explained

Learn what Attribute Based Access Control (ABAC) is, how it works, and why it offers flexible, fine-grained access management for today’s dynamic organizations.
What Is Natural Language Processing? A Complete Guide to NLP
Learn
9 Minute Read

What Is Natural Language Processing? A Complete Guide to NLP

Discover what natural language processing (NLP) is, how it works, key techniques, real-world applications, and the main challenges facing the field today.
Rethinking Observability: From Risk Mitigation to Business Transformation
Observability
4 Minute Read

Rethinking Observability: From Risk Mitigation to Business Transformation

Rethink observability—not as just an IT safety net, but as a catalyst for business growth and innovation. Discover how unified, real-time insights can turn complexity into your competitive edge.
Obey My Logs! AI-Powered Compromised Credential Detection
Security
13 Minute Read

Obey My Logs! AI-Powered Compromised Credential Detection

Splunker Shannon Davis shares a closer look into how to detect compromised credentials with AI-powered PLoB.