/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Typosquatting & How To Prevent It
Learn
5 Minute Read

Typosquatting & How To Prevent It

When it comes to security, every detail matters. Typosquatting turns small errors into big consequences, here's what to look out for.
Security Content from the Splunk Threat Research Team
Security
5 Minute Read

Security Content from the Splunk Threat Research Team

The blog explains how STRT develops Splunk Security Content, aiding detection engineering and threat research teams to efficiently detect and respond to potential threats, using ESCU App amidst growing security incidents and system complexity.
Hypothesis-Driven Hunting with the PEAK Framework
Security
9 Minute Read

Hypothesis-Driven Hunting with the PEAK Framework

Details on hypothesis-driven threat hunting with the PEAK framework.
Industry Leaders Share Thoughts on the Cyber Talent Gap
Leadership
2 Minute Read

Industry Leaders Share Thoughts on the Cyber Talent Gap

Eric Fusilero is honored to be part of an esteemed panel of leaders who are thinking about innovative solutions to help fill the job vacancies being perpetuated by the ever-changing, data-centric industry.
Splunk Becomes a TISAX Participant
Industries
4 Minute Read

Splunk Becomes a TISAX Participant

With increasing focus on implementing security standards within the digital supply chain, national and industry-specific certifications have become increasingly important. Today, we are excited to announce that Splunk Services Germany GmbH has become a TISAX participant.
The Public Sector's Worst Nightmare: Fraud
Industries
2 Minute Read

The Public Sector's Worst Nightmare: Fraud

In this post, we’ll dive deeper into how much fraud affects the public sector.
Password Spraying Attacks: What You Need To Know To Prevent Attacks
Learn
6 Minute Read

Password Spraying Attacks: What You Need To Know To Prevent Attacks

Password spraying remains a threat today, despite improvements in password safety and privacy. Read all about this attack tactic in order to prevent it.
Planning for Success with Risk-Based Alerting
Security
4 Minute Read

Planning for Success with Risk-Based Alerting

In our last RBA blog post, we talked about some of the problems RBA can help solve. In this post, we explain the methodology we use with Splunk customers as their security teams start working with RBA.
Machine Learning in Security: Detect Suspicious TXT Records Using Deep Learning
Security
8 Minute Read

Machine Learning in Security: Detect Suspicious TXT Records Using Deep Learning

The Splunk Machine Learning for Security (SMLS) team introduces a new detection to detect DNS Tunneling using DNS TXT payloads.