false
Splunk Blogs
Observability
3 Min Read
Splunk releases its newest report, State of Observability 2025: The Rise of a New Business Catalyst.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Observability 5 Min Read

Correlation Does Not Equal Causation - Especially When It Comes to Observability [Part 1]

Observability has been tied up with causality from its origins in the mathematical realm of control theory in the early 1960s. But what precisely does the term ‘causality’ denote? In how does correlation come into play when it comes to observability? Read on to find out more.
Splunk Life 2 Min Read

Lexi’s Unexpected Path to Tech

Get to know Splunker Alexandra Nuttbrown, one of the co-leads of our Womxn+ Employee Resource Group which helps foster, empower and grow a diverse womxn-led community.
Security 6 Min Read

Threat Hunting for Dictionary-DGA with PEAK

Explore applied model-assisted threat hunting for dictionary-based domain generation algorithms using the SURGe Security Research Team's PEAK Threat Hunting Framework.
Learn 7 Min Read

Data Security Today: Threats, Techniques & Solutions

Data security is more important than ever. With organizations relying heavily on technology for their sensitive information, the risk of data breaches is constantly rising.
Industries 4 Min Read

Observability for the Public Sector: Greater Visibility for a More Resilient Digital Future

Discover key observability insights, challenges and trends from leaders across the public sector.
Industry Insights 3 Min Read

The Security Detail Download: Cyber Threats to the Public Sector in Australia

The Australian government faces unique challenges when it comes to cybersecurity, but their solutions are prime examples of cybersecurity success. Learn more in this episode of the Security Detail podcast.
Learn 6 Min Read

Data Loss Prevention (DLP): Definition, Components & Types

Explore Data Loss Prevention (DLP), a vital security solution for safeguarding sensitive information, compliance, and minimizing data breach risks.
Security 4 Min Read

Deep Learning in Security: Text-based Phishing Email Detection with BERT Model

We introduced a large language model (LLM)-based phishing email detector integrated into the Splunk DSDL app. We provide details on model training and evaluation, comparisons to other machine learning and deep learning algorithms as well as deployment approaches to Splunk in this blog.
Learn 5 Min Read

Data Governance: Definitions, Components, & Best Practices

Discover the importance of data governance in a data-driven world. Learn key components, benefits, and best practices for secure, high-quality data.