false
Splunk Blogs
Observability
3 Min Read
Splunk releases its newest report, State of Observability 2025: The Rise of a New Business Catalyst.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Learn 7 Min Read

What Are Social Engineering Attacks? A Detailed Explanation

In this post, we'll explore how cybercriminals use a variety of tactics and understand how to defend against social engineering attacks.
Security 11 Min Read

LLM Security: Splunk & OWASP Top 10 for LLM-based Applications

Threats to LLMs are real. Let’s look at top LLM threats and show you how, with Splunk, you can better defend LLM-based applications and their users.
Security 2 Min Read

Announcing General Availability of Cisco Talos Intelligence in Splunk Attack Analyzer

We are pleased to announce the general availability of Cisco Talos threat intelligence to all Splunk Attack Analyzer customers globally.
Global Impact 3 Min Read

Impact Bytes: Sharing Their Skills and Passions for Causes in Their Communities

Splunk’s Impact Bytes series highlights customers, grantees, and employees creating positive change in our local and global communities.
Platform 2 Min Read

Unlock the Value of Cloud: Introducing Splunk Cloud Value Calculator

Splunker Deepak Belani explains how our new Splunk Cloud Value Calculator can calculate how much admin effort you can save by using Splunk Cloud Platform.
Platform 2 Min Read

What’s Next For Splunk App Developers

A sneak peak of what’s on our radar for Splunk app developers.
Observability 2 Min Read

Setting up and Understanding OpenTelemetry Collector Pipelines Through Visualization

Splunker Greg Leffler walks us through OTelBin, a free and open-source tool created by the OpenTelemetry community.
Security 6 Min Read

Embracing Observability Tools to Empower Security Incident Response

Bridge the gap between development and security with OpenTelemetry and observability tools.
Security 3 Min Read

Driving vSOC Detection with Machine Learning

In this blog, Splunker Jim Goodrich takes a deep dive into an API security use case, using machine learning to detect API anomalies, and more.