/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

Impact Bytes: Turning Data to Action to Fight Exploitation
Global Impact
3 Minute Read

Impact Bytes: Turning Data to Action to Fight Exploitation

Global Emancipation Network and Splunk use innovative data and AI solutions to rescue victims and change lives.
London to Paris Cycle for Prostate Cancer - Day 3
Global Impact
4 Minute Read

London to Paris Cycle for Prostate Cancer - Day 3

After days of battling the elements, technical glitches, and plenty of laughs along the way, our incredible team of Splunkers has arrived at the Eiffel Tower and managed to complete their bike ride. Read all about it here.
Phishing Attacks: Protecting Against Them
Learn
7 Minute Read

Phishing Attacks: Protecting Against Them

Phishing attacks exploit social engineering to deceive victims into disclosing sensitive information or installing malware.
SBOMs: Software Bill of Materials, Explained
Learn
7 Minute Read

SBOMs: Software Bill of Materials, Explained

The software bill of materials (SBOM) lists all component parts and software dependencies used in application development and delivery.
Handala’s Wiper: Threat Analysis and Detections
Security
17 Minute Read

Handala’s Wiper: Threat Analysis and Detections

Cisco Talos and the Splunk Threat Research Team provide a comprehensive analysis that expands on existing coverage of Handala's Wiper and offers unique insights.
London to Paris Cycle for Prostate Cancer - Day 2
Global Impact
4 Minute Read

London to Paris Cycle for Prostate Cancer - Day 2

Our Splunkers are officially two days into their epic journey from London to Paris, and what a day it was! With sore legs, aching muscles, and a few bumps along the way, the riders are now in full swing with the end in sight as they navigate the beautiful countryside of France. Read more about the events of Day 2 here.
Expert Guidance for Fraud Detection and Prevention
Industries
2 Minute Read

Expert Guidance for Fraud Detection and Prevention

Splunker Beverly Smart explains why your organization must be prepared to defend against fraud across your technical infrastructure.
What Does it Take to be a Resilience Leader?
Cio Office
3 Minute Read

What Does it Take to be a Resilience Leader?

Hint: visibility, collaboration, and proactivity play key roles.
The Room Where It Happens: .conf+ Brings Together Executive Movers, Shakers and Change Makers
Cio Office
4 Minute Read

The Room Where It Happens: .conf+ Brings Together Executive Movers, Shakers and Change Makers

Listening in to CXOs from public and private sectors as they discuss today’s biggest technology trends and most pressing challenges.