false
Splunk Blogs
Observability
3 Min Read
Splunk releases its newest report, State of Observability 2025: The Rise of a New Business Catalyst.

Featured Articles

.conf & .conf Go

Learn

Latest Articles

Learn 6 Min Read

Incident Response Plans: The Complete Guide To Creating & Maintaining IRPs

Need to update your incident response plan? Start here! We’ll show how to create one that works, and how to maintain it for the long haul so it stays effective.
Observability 4 Min Read

RUM Session Replay Or How "Watching Videos" Will Help Us With Digital Experience Monitoring!

Using the Session Replay function with Splunk Real User Monitoring offers valuable benefits to understand and improve the user experience more quickly.
Observability 6 Min Read

Observability and Telecommunications Network Management [Part 1]

When considering the management of telecommunications networks, it might make sense to directly consider the observable data streams available to the practitioner instead of a model-based approach. Learn more in this blog.

Empowering the Global Workforce: The Splunk Authorized Learning Partner Program

Splunker Sophie Mills shares a closer look at the Splunk Authorized Learning Partner (ALP) Program, which is committed to scaling and expanding the education and adoption of Splunk to customers, partners, and Splunkers by building a community of certified Splunk learning partners.
Industry Insights 3 Min Read

Manufacturers Aren’t Just Talking About Modernizing OT Security Anymore. They’re Doing It.

It's time for all manufacturing leaders to connect and leverage IT and OT in a unified fight for more secure, efficient operations, from the boardroom to the production line, and everywhere in between.
Splunk Life 3 Min Read

Splunktern Spotlight: Izabela Golec

Meet Izabela Golec, a Software Development Intern based in our Krakow, Poland office. She shares her experience at Splunk, tips for prospective interns at Splunk and her advise for females considering a career in tech.
Learn 5 Min Read

How Data Architecture Determines How Your Data Can Be Used

Data architecture determines how you can use your data. Read on to learn how to choose data storage, data pipeline and data management strategies.
Learn 5 Min Read

The National Cyber Workforce & Education Strategy (NCWES) Explained

Learn about the National Cyber Workforce & Education Strategy, a U.S. program for shaping the future of cybersecurity by promoting cybersecurity education.
CISO Circle 3 Min Read

Rogue AI or Jedi Ally: On the Impact of Artificial Intelligence on Enterprise Security

AI is heading towards ubiquity, presenting both new vulnerabilities and opportunities. When enterprises must protect themselves and innovate in already complex environments, it’s important to consider how AI can impact your organization’s security posture.