false
Splunk Blogs
Observability
3 Min Read
Splunk releases its newest report, State of Observability 2025: The Rise of a New Business Catalyst.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Learn 3 Min Read

Intelligent Applications Explained

Intelligent Applications are a Top 10 Strategic Tech Trend from Gartner. Learn how an app can become intelligent — and what that means for business.
Learn 5 Min Read

Open Source vs. Closed Source Software

Understand the two models for software today: open source and closed source. Deciding which works for you comes down to need and preference.
Learn 7 Min Read

What is Business Impact Analysis?

A business impact analysis helps you prepare for service continuity in the face of disruption. Get the full story and the 8-step BIA process here.
CISO Circle 1 Min Read

Keys for Recruiting Top Tech Talent

Hear insights from security leaders at Just Eat Takeaway.com.
Learn 4 Min Read

Secure By Design: What Makes Software SbD

As the digital landscape continues to evolve, new cyber threats continue to emerge. It’s imperative to have safeguards in place early on in the product development process. That’s where Secure by Design comes in.
Security 4 Min Read

Detecting Lateral Movement with Splunk: How To Spot the Signs

Identifying lateral movement is so important, and it sure isn't easy. Using Splunk makes it a lot easier, and we'll show you how in this tutorial.
Observability 3 Min Read

Unlock the Power of Observability with OpenTelemetry Logs Data Model

If you're building a new application or enhancing an existing one, consider adopting the OpenTelemetry Logs Data Model's Log and Event Record Definition.
Security 3 Min Read

Staff Picks for Splunk Security Reading March 2024

Welcome to the March 2024 Splunk staff picks, featuring a curated list of presentations, whitepapers, and customer case studies that we feel are worth a read.
Security 6 Min Read

UEBA Superpowers: Detect and Eliminate Advanced Threats with Machine Learning

Splunk User Behavior Analytics (UBA) detects advanced attacks and insider threats with unsupervised machine learning.