false
Splunk Blogs
Observability
3 Min Read
Splunk releases its newest report, State of Observability 2025: The Rise of a New Business Catalyst.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Observability 4 Min Read

It Takes a Village – And Some New Features From Splunk – To Scale Your Cloud Monitoring Without Breaking the Bank

New features within Splunk Observability Cloud empower engineering teams to scale their observability practice while controlling costs.
Leadership 6 Min Read

Are You a Good or Great Boxer? Real-World Approaches of Building Cyber Resilience in 2023

You must have been asleep not to have heard about Splunk’s new mission - ‘to build a safer and more resilient digital world’. Why have we chosen this? Well, not because it is a snappy little tagline, but because we know how important digital resilience is to all of our customers in our ever changing times.
Security 4 Min Read

Introducing the PEAK Threat Hunting Framework

Introducing the PEAK Threat Hunting Framework, bringing a fresh perspective to threat hunting and incorporating three distinct types of hunts.
Security 3 Min Read

Send Your SOAR Events to Splunk

Make your SIEM your single point of truth by ingesting events that are otherwise seen only by Splunk Security, Orchestration, Automation and Response (SOAR).
Leadership 3 Min Read

Building a Safer and More Resilient Digital World

Splunk CEO, Gary Steele, reflects on his first year and the moments that have shown how Splunk provides mission-critical value to security, IT and engineering teams globally.
Learn 4 Min Read

Kotter’s 8 Steps for Leading Change in Organizations

Organizational change is hard. But following 8 steps will help! Read on for practical tips and insights for success with the Kotter 8 step process.
Security 15 Min Read

These Are The Drivers You Are Looking For: Detect and Prevent Malicious Drivers

The Splunk Threat Research Team explores how to detect and prevent malicious drivers and discusses Splunk Security Content available to defend against these types of attacks.
Learn 5 Min Read

Log Analytics: Analyzing Log Data 101

Breaking news: Log data can provide a ton of value, if you know how to do it right. Read on to get everything you need to know to maximize value from logs.
Security 3 Min Read

Level Up Your Cybersecurity with Risk-Based Alerting

In our first blog in the Splunk RBA series, we introduced Risk-Based Alerting (RBA) and covered the basic principles of RBA. In the rest of this series, we explain how you can plan and then implement RBA within your organization.