/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

What's BPA? Business Process Analytics, Explained
Learn
6 Minute Read

What's BPA? Business Process Analytics, Explained

Discover how leveraging data-driven insights can streamline complex IT systems, optimize processes, and propel your organization toward operational excellence.
SNMP & SNMP Monitoring, Explained
Learn
7 Minute Read

SNMP & SNMP Monitoring, Explained

Simple Network Management Protocol (SNMP) allows administrators to maintain nearly all aspects of a network — here are the tools and commands admins can put to use.
Splunk Achieves Secure Cloud Solution for SLED with StateRAMP Authorization
Industries
1 Minute Read

Splunk Achieves Secure Cloud Solution for SLED with StateRAMP Authorization

Splunk continues its commitment to state and local government and higher education by achieving an 'Authorized' designation from the State Risk and Authorization Management Program (StateRAMP®).
Don’t Get a PaperCut: Analyzing CVE-2023-27350
Security
9 Minute Read

Don’t Get a PaperCut: Analyzing CVE-2023-27350

The Splunk Threat Research team shares insights on the CVE-2023-27350 vulnerability, proof of concept scripts, setting up Splunk logging, and detecting adversaries for secure printing.
Reflecting on 2023 Global Health & Wellbeing Month
Splunk Life
2 Minute Read

Reflecting on 2023 Global Health & Wellbeing Month

Learnings from the events Splunk hosted throughout the month
Splunk SOAR Playbook of the Month: Tackling Phishing Attempts with Identifier Reputation Analysis
Security
3 Minute Read

Splunk SOAR Playbook of the Month: Tackling Phishing Attempts with Identifier Reputation Analysis

Learn how you can use Splunk's identifier reputation analysis playbooks to implement a workflow that will help your team automate the alert and quarantine processes for potential threats based on key identifiers.
Do Not Cross The 'RedLine' Stealer: Detections and Analysis
Security
11 Minute Read

Do Not Cross The 'RedLine' Stealer: Detections and Analysis

The Splunk Threat Research Team provides a deep dive analysis of the RedLine Stealer threat and shares valuable insights to help enable blue teamers to defend against and detect this malware variant.
Superapps: What They Are and How They Work
Learn
4 Minute Read

Superapps: What They Are and How They Work

Approving and adopting new enterprise software is hard — superapps simplify the process by putting everything in one box, an ecosystem of tools in one interface
Staff Picks for Splunk Security Reading May 2023
Security
3 Minute Read

Staff Picks for Splunk Security Reading May 2023

Welcome to the Splunk staff picks, featuring a curated list of presentations, whitepapers, and customer case studies that our Splunk security experts feel are worth a read.