/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Shift Left Security Today: Adoption Trends & How To Shift Security Left
Learn
7 Minute Read

Shift Left Security Today: Adoption Trends & How To Shift Security Left

Get the lowdown on shift left security: build security earlier into the software development process (aka to the left) to improve overall application security.
SNARE: The Hunters Guide to Documentation
Security
6 Minute Read

SNARE: The Hunters Guide to Documentation

Discover the SNARE framework for effective threat hunting documentation.
The Imperative of Cyber Resilience: Shaping a Secure Future for Public and Private Sectors
Industries
4 Minute Read

The Imperative of Cyber Resilience: Shaping a Secure Future for Public and Private Sectors

Frank Dimina breaks down the evolving threat landscape and what organizations can do to stay ahead.
Fine-Grained Authorization for Saved Searches
Platform
4 Minute Read

Fine-Grained Authorization for Saved Searches

Splunk is excited to provide fine-grained authorization for Knowledge Objects starting with Saved Searches.
Dashboard Studio: Small Changes, Big Impact
Platform
2 Minute Read

Dashboard Studio: Small Changes, Big Impact

Level up your dashboarding experience with the enhancements we've made in Splunk Cloud Platform 9.3.2411.
Dashboard Studio: Your Dashboards, Now Guest-Friendly
Platform
2 Minute Read

Dashboard Studio: Your Dashboards, Now Guest-Friendly

Learn how to share your Studio dashboards with the Publish Dashboard feature.
API Monitoring Explained: How To Monitor APIs Today
Learn
8 Minute Read

API Monitoring Explained: How To Monitor APIs Today

In this blog post, we'll define API Monitoring and explore common challenges and benefits of monitoring APIs.
Dark Data: An Introduction
Learn
6 Minute Read

Dark Data: An Introduction

Explore the growing impact of dark data on businesses, its potential for AI, operational efficiency, and risk management, and strategies for unlocking its value.
Exploring AI for Vulnerability Investigation and Prioritisation
Security
5 Minute Read

Exploring AI for Vulnerability Investigation and Prioritisation

Splunker James Hodgkinson explains how AI-driven tools can revolutionize vulnerability investigation and prioritization.