/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Splunktern Spotlight: Izabela Golec
Splunk Life
3 Minute Read

Splunktern Spotlight: Izabela Golec

Meet Izabela Golec, a Software Development Intern based in our Krakow, Poland office. She shares her experience at Splunk, tips for prospective interns at Splunk and her advise for females considering a career in tech.
How To Set Up Monitoring for Your Hybrid Environment
Observability
4 Minute Read

How To Set Up Monitoring for Your Hybrid Environment

Splunk meets the demands of today to deliver comprehensive observability in hybrid environments.
Using Amazon SageMaker to Predict Risk Scores from Splunk
Industries
5 Minute Read

Using Amazon SageMaker to Predict Risk Scores from Splunk

Splunker Nimish Doshi covers using Amazon SageMaker and Splunk to further develop a fraud detection use case to predict future risk scores.
Secure AI System Development
Learn
4 Minute Read

Secure AI System Development

CISA & NCSC have issued joint guidelines for developing secure AI systems. Let's understand these guidelines, so we can mitigate risk in AI development.
How to Monitor Your Hybrid Applications Without Toil
Observability
2 Minute Read

How to Monitor Your Hybrid Applications Without Toil

Splunk can help you conquer the complexity of your hybrid environment.
Availability Management: An Introduction
Learn
6 Minute Read

Availability Management: An Introduction

Understand application availability, why traditional availability monitoring fails, and best practices for end-to-end monitoring for today’s availability.
Data Privacy in the Era of AI
Ciso Circle
2 Minute Read

Data Privacy in the Era of AI

What impacts will new generative AI advancements have on data privacy regulation in 2024? And how should companies prepare?
Continuous Threat Exposure Management (CTEM)
Learn
7 Minute Read

Continuous Threat Exposure Management (CTEM)

Attack surfaces changing daily? Cyber threats on the rise? Old ways of working ain't cutting it? CTEM may be your cyber solution. Get the full story here.
Endpoints and Endpoint Detection: Importance & Risk Mapping
Learn
4 Minute Read

Endpoints and Endpoint Detection: Importance & Risk Mapping

Endpoints sound like an afterthought...not like the most important part of your cybersecurity posture. Learn what endpoints are, and why detecting them is so important.