/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Splunk Mobile: Your Brand-New Home Screen
Platform
3 Minute Read

Splunk Mobile: Your Brand-New Home Screen

Discover Splunk Mobile’s brand-new Home Screen—personalize your view, access key metrics instantly, and take your data insights anywhere.
Announcing Splunk Enterprise 10.2 & Splunk Cloud Platform 10.2 – Next Generation Querying & Analytics
Platform
5 Minute Read

Announcing Splunk Enterprise 10.2 & Splunk Cloud Platform 10.2 – Next Generation Querying & Analytics

We're thrilled to unveil Splunk Enterprise 10.2 and Splunk Cloud Platform 10.2, raising the bar for unified data access, security, and actionable insights.
Introducing SPL2: The Next-Generation Search & Data Preparation Language for Splunk
Platform
5 Minute Read

Introducing SPL2: The Next-Generation Search & Data Preparation Language for Splunk

Announcing the worldwide availability of Search Processing Language version 2 (SPL2), the next evolution of our powerful SPL language for data search and preparation, now in Splunk Enterprise and Splunk Cloud Platform.
Cybersecurity Attacks Explained: How They Work & What’s Coming Next in 2026
Learn
4 Minute Read

Cybersecurity Attacks Explained: How They Work & What’s Coming Next in 2026

Today’s cyberattacks are more targeted, AI-driven, and harder to detect. Learn how modern attacks work, key attack types, and what security teams should expect in 2026.
Exploit Prediction Scoring System (EPSS): How It Works and Why It Matters
Learn
5 Minute Read

Exploit Prediction Scoring System (EPSS): How It Works and Why It Matters

Discover how the Exploit Prediction Scoring System (EPSS) predicts the likelihood of vulnerability exploitation, improves prioritization, and differs from CVSS.
Strong Data Governance, Stronger AI Results
Ciso Circle
8 Minute Read

Strong Data Governance, Stronger AI Results

Align governance and culture to break down silos and scale AI responsibly for smarter, more connected organizations.
Defending Against npm Supply Chain Attacks: A Practical Guide to Detection, Emulation, and Analysis
Security
18 Minute Read

Defending Against npm Supply Chain Attacks: A Practical Guide to Detection, Emulation, and Analysis

Protect your software supply chain from npm attacks. Learn to use Package-Inferno and npm-threat-emulation for deep analysis and detection with Splunk SPL.
Navigating the Future: The New Cyber Security Risk Management Construct (CSRMC)
Industries
4 Minute Read

Navigating the Future: The New Cyber Security Risk Management Construct (CSRMC)

The Cyber Security Risk Management Construct is the DoW’s latest approach to managing cyber risk across its vast and diverse ecosystem.
What Are Servers? A Practical Guide for Modern IT & AI
Learn
4 Minute Read

What Are Servers? A Practical Guide for Modern IT & AI

Learn what a computer server is, how servers work, common server types, key components, and how to choose the right server for your organization.