/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

15 Must-Have SIEM Features for Modern Threat Defense in 2026
Learn
9 Minute Read

15 Must-Have SIEM Features for Modern Threat Defense in 2026

Discover the 15 must-have features every modern SIEM needs, from real-time event correlation to UEBA, automation, and cloud support, to detect, investigate, and stop advanced cyber threats.
Busywork Is Breaking the SOC — Here’s How to Fix It
Ciso Circle
4 Minute Read

Busywork Is Breaking the SOC — Here’s How to Fix It

It's time to re-imagine what success looks like in the SOC so the team stays focused on meaningful, strategic work.
Inside Kubernetes: A Practical Guide to K8s Architecture and Operational Challenges
Learn
4 Minute Read

Inside Kubernetes: A Practical Guide to K8s Architecture and Operational Challenges

Understand the core components of Kubernetes architecture, challenges in operating it, and how observability tools help monitor and optimize deployments.
Detecting Suspicious ESXi Activity Before Ransomware Happens
Security
11 Minute Read

Detecting Suspicious ESXi Activity Before Ransomware Happens

Learn to detect suspicious activity using Splunk, including log ingestion, common indicators, and comprehensive detection strategies for VMware ESXi environments.
Picture Paints a Thousand Codes: Dissecting Image-Based Steganography in a .NET (Quasar) RAT Loader
Security
13 Minute Read

Picture Paints a Thousand Codes: Dissecting Image-Based Steganography in a .NET (Quasar) RAT Loader

Uncover how to identify malicious executable loaders that use steganography to deliver payloads such as Quasar RAT.
Using RAG, Splunk ES Content Update App (ESCU), and MLTK to Develop, Enhance, and Analyze Splunk Detections
Artificial Intelligence
5 Minute Read

Using RAG, Splunk ES Content Update App (ESCU), and MLTK to Develop, Enhance, and Analyze Splunk Detections

Learn how to enhance Splunk security detections using a local Llama3 LLM, RAG, MLTK, and ESCU.
Mission Control for Modern Risk
Ciso Circle
6 Minute Read

Mission Control for Modern Risk

Discover how fusion centers merge cyber, fraud, and ops data into a mission‑control view. Automate response, and reduce risk faster than siloed teams.
The Splunk Platform Track at .conf25: 10 Sessions You Can't Miss
.conf & .conf Go
3 Minute Read

The Splunk Platform Track at .conf25: 10 Sessions You Can't Miss

Explore the Splunk Platform Track at .conf25! Discover 83 sessions on AI, data management, and digital resilience, including Cisco integrations. Accelerate your Splunk value.
Leveraging Machine Learning, Splunk Enterprise, the Splunk Edge Hub and MQTT for Data Integration
Partners
5 Minute Read

Leveraging Machine Learning, Splunk Enterprise, the Splunk Edge Hub and MQTT for Data Integration

Leverage existing hardware to build new datasets and insights with the combined power of the Splunk Platform and Cisco Meraki.