false
Splunk Blogs
Observability
3 Min Read
Splunk releases its newest report, State of Observability 2025: The Rise of a New Business Catalyst.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

CISO Circle 5 Min Read

When An Incident Goes Public

CISOs are under immense pressure to navigate new regulatory demands and legal risks, making proactive incident response and team mental health a top priority when a security breach goes public.
Partners 3 Min Read

Achieving Cyber Resilience Has Never Been More Important - Here’s Why

Building a SecOps strategy to improve cyber resilience is not just a security framework for organizations – it's essential to get ahead of issues and prevent downtime from causing chaos.
Learn 8 Min Read

What’s OSINT? Open-Source Intelligence Explained

Open-source intelligence (OSINT) is the term for collecting and analyzing publicly available data to generate actionable intelligence. Get the full story on OSINT here.
Learn 5 Min Read

What Is Threat Analysis?

A threat analysis helps organizations discover what security risks they need to be protected from. Learn all about threat analysis here.
Security 3 Min Read

Comprehensive, Continuous, and Compliant: Obtain Proactive Insights with Splunk Asset and Risk Intelligence

Announcing the release of the latest addition to our security product portfolio, Splunk Asset and Risk Intelligence.
Security 3 Min Read

Fortify Digital Resilience with Splunk + Cisco Talos Incident Response

Announcing the availability of Cisco Talos Incident Response services to Splunk customers.
Observability 3 Min Read

Introducing Log Observer Connect for AppDynamics

Log Observer Connect for AppDynamics enables in-context navigation between AppDynamics and Splunk. This unified observability troubleshooting experience promises to streamline problem identification, but also aligns cross-functional teams by providing shared insights into application performance issues across tools.
Learn 7 Min Read

What Are Stored Procedures?

An important feature of SQL, stored procedures greatly improve the efficiency, security, and functionality of your database. Get the full story here.
Learn 7 Min Read

What Are Social Engineering Attacks? A Detailed Explanation

In this post, we'll explore how cybercriminals use a variety of tactics and understand how to defend against social engineering attacks.