/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Beyond Logs: Navigating Entity Behavior in Splunk Platform
Security
7 Minute Read

Beyond Logs: Navigating Entity Behavior in Splunk Platform

Master internal threat detection with Splunk's anomaly detection, finding events like unusual geolocations and spikes in activity, while optimizing security.
Unveiling Phemedrone Stealer: Threat Analysis and Detections
Security
11 Minute Read

Unveiling Phemedrone Stealer: Threat Analysis and Detections

The Splunk Threat Research Team dissects the Phemedrone Stealer.
Add to Chrome? - Part 3: Findings and Recommendations
Security
5 Minute Read

Add to Chrome? - Part 3: Findings and Recommendations

SURGe explores findings and general recommendations on whether or not you should click 'Add to Chrome' the next time you find a fancy new extension.
Manufacturers Hate False Promises. Here’s How to Keep Net Zero From Becoming One.
Industry Insights
3 Minute Read

Manufacturers Hate False Promises. Here’s How to Keep Net Zero From Becoming One.

Where manufacturing leaders should start on their path to net-zero, from Ewald Munz, Head of Manufacturing, Automotive and Sustainability EMEA at Splunk.
Add to Chrome? - Part 2: How We Did Our Research
Security
5 Minute Read

Add to Chrome? - Part 2: How We Did Our Research

SURGe explores the analysis pipeline in more detail and digs into the two main phases of this research – how the team collected the data and how they analyzed it.
Why the AI Hype Is Here to Stay
Cio Office
4 Minute Read

Why the AI Hype Is Here to Stay

Forecasting the scale of AI’s impact in the next few years.
Google Cloud Next 2025: Complete Guide
Learn
4 Minute Read

Google Cloud Next 2025: Complete Guide

This blog post will cover the complete details around Google Cloud Next 2024, the upcoming conference in Las Vegas.
Are You Forensic Ready?
Security
5 Minute Read

Are You Forensic Ready?

In the landscape of everyday operations, the concept of forensic readiness may often linger unnoticed in the background.
Hunting M365 Invaders: Navigating the Shadows of Midnight Blizzard
Security
11 Minute Read

Hunting M365 Invaders: Navigating the Shadows of Midnight Blizzard

The Splunk Threat Research Team outlines the attack chain detailed in the Microsoft blog, offering practical detection and hunting tips for cybersecurity defenders.