false
Splunk Blogs
Observability
3 Min Read
Splunk releases its newest report, State of Observability 2025: The Rise of a New Business Catalyst.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Unlocking Possibilities: How Customers Use Splunk for Security and IT Success

With Splunk, there are endless possibilities and use cases for customers to utilize across their environments – and this is what makes Splunk so valuable to their organizations.

Splunk Summed Up: How Our Customers Describe Splunk in One Word

What is the first thought that comes to mind when you think about describing Splunk in one word? Hear what our customers had to say.
Security 4 Min Read

Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

As of Splunk Enterprise 10.0, mTLS is now supported across 10 essential communication paths in your deployment—from forwarders and HTTP Event Collector (HEC) to clustered search heads and indexers.
Learn 8 Min Read

Real-Time Data: An Overview and Introduction

Unlock the power of real-time data to drive instant decisions, improve customer experiences, and gain a competitive edge with the right data architecture.
Security 6 Min Read

Uniting for Collective Defence: How Splunk and ASD Are Strengthening National Cyber Resilience Through CTIS

In response to the evolving cyber threat environment, the Australian Government has taken proactive steps to strengthen national cyber defences.
Security 2 Min Read

2025 Worldwide BOTS Day

After a successful launch of BOTS at .conf25, we’re ready to take it to the masses with two worldwide BOTS10 competitions.
Security 10 Min Read

From Prompt to Payload: LAMEHUG’s LLM-Driven Cyber Intrusion

The Splunk Threat Research Team analyzes the LAMEHUG malware, examining its tactics and techniques to provide insights that can help SOC analysts and blue teamers identify and respond.
Security 7 Min Read

Building a Cross-Functional Remote Employment Fraud Response Team

In this blog, Splunkers Jonathan Heckinger and Brian Starrs cover the most complex aspect of REF risk: what to do after you find it.
CISO Circle 4 Min Read

Data Gravity, Not Data Volume, Is What’s Holding You Back

Overcome data gravity by activating the right data, not just accumulating it. Learn how to boost digital resilience, optimize hybrid cloud, and leverage AI effectively.