/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Administer Your Splunk Cloud Stacks Easily and Efficiently with ACS Helper for Splunk
Tips & Tricks
2 Minute Read

Administer Your Splunk Cloud Stacks Easily and Efficiently with ACS Helper for Splunk

Administer your Splunk Cloud instances more easily with ACS Helper for Splunk. This free app is now available on Splunkbase.
SQL vs. NoSQL Today: Databases, Differences & When To Use Which
Learn
7 Minute Read

SQL vs. NoSQL Today: Databases, Differences & When To Use Which

Trying to decide on the right database type? SQL and NoSQL each have their own pros and cons, from relational to schema-less, to vertical and horizontal scaling.
SOC Metrics: Security Metrics & KPIs for Measuring SOC Success
Learn
8 Minute Read

SOC Metrics: Security Metrics & KPIs for Measuring SOC Success

Maintaining a keen eye on SOC success is critical in any security operation. Join us as we discuss common KPIs, and how to leverage metrics for improvement.
Outputs vs. Outcomes: Understanding the Differences
Learn
4 Minute Read

Outputs vs. Outcomes: Understanding the Differences

Measuring success is no small equation: correctly assessing outputs versus outcomes can help us get it right. Join us to explore the key differences between the two.
Red Teams vs. Blue Teams: What’s The Difference?
Learn
10 Minute Read

Red Teams vs. Blue Teams: What’s The Difference?

Effective cybersecurity is a group effort - better yet, a multi-group effort. Learn how the Red Team Blue Team approach tackles security from both angles.
Model-Assisted Threat Hunting (M-ATH) with the PEAK Framework
Security
9 Minute Read

Model-Assisted Threat Hunting (M-ATH) with the PEAK Framework

Welcome to the third entry in our introduction to the PEAK Threat Hunting Framework! Taking our detective theme to the next level, imagine a tough case where you need to call in a specialized investigator. For these unique cases, we can use algorithmically-driven approaches called Model-Assisted Threat Hunting (M-ATH).
Trust Unearned? Evaluating CA Trustworthiness Across 5 Billion Certificates
Security
10 Minute Read

Trust Unearned? Evaluating CA Trustworthiness Across 5 Billion Certificates

In this blog post, we dive into our recent research project, in which the Splunk SURGe team analyzed more than five billion TLS certificates to find out if the CAs we rely on are really worthy of our trust.
The State of Observability 2023: Realizing ROI and Increasing Digital Resilience
Observability
2 Minute Read

The State of Observability 2023: Realizing ROI and Increasing Digital Resilience

Splunk has published The State of Observability 2023 — a research report created in partnership with ESG — to understand best practices, challenges and trends across the observability landscape.
Fighting Fraud, Waste, and Abuse in Government
Industries
3 Minute Read

Fighting Fraud, Waste, and Abuse in Government

Leveraging Splunk's ability to correlate events helps investigators detect patterns and anomalies across multiple data sets that are difficult to see using spreadsheets or traditional Business Intelligence tools