/en_us/blog/observability/state-of-observability-2025

Splunk Blogs

.conf & .conf Go

Learn

Latest Articles

London to Paris Cycle for Prostate Cancer - Day 2
Global Impact
4 Minute Read

London to Paris Cycle for Prostate Cancer - Day 2

Our Splunkers are officially two days into their epic journey from London to Paris, and what a day it was! With sore legs, aching muscles, and a few bumps along the way, the riders are now in full swing with the end in sight as they navigate the beautiful countryside of France. Read more about the events of Day 2 here.
Fusion Teams: What Are They?
Learn
6 Minute Read

Fusion Teams: What Are They?

Fusion teams, also known as cross-functional or interdisciplinary teams, come together to work on a specific project or initiative. Get the full story here.
Redundancy vs. Resiliency in IT: What’s The Difference?
Learn
7 Minute Read

Redundancy vs. Resiliency in IT: What’s The Difference?

In IT systems, redundancy and resiliency are often talked about together and you can’t have one without the other. Get the full story here.
London to Paris Cycle for Prostate Cancer - Day 1
Global Impact
3 Minute Read

London to Paris Cycle for Prostate Cancer - Day 1

The team of brave Splunkers set out from Splunks Paddington office in London, embarking on their three-day, 375-kilometer journey to Paris, all in the name of raising awareness and funds for Prostate Cancer UK. Read all about Day 1here on Splunk Blogs.
Splunk SOAR Has Attained FedRAMP Moderate Authorization
Industries
2 Minute Read

Splunk SOAR Has Attained FedRAMP Moderate Authorization

Splunk SOAR has received Federal Risk and Authorization Management Program (FedRAMP) Agency Authorization at the Moderate impact level.
The Caesar Cipher, Explained
Learn
6 Minute Read

The Caesar Cipher, Explained

The Caesar Cipher is among the oldest encryption techniques used to communicate securely. It’s simple to use and easy to break, as you’ll see here.
Intrusion Detection Systems (IDS): Definition, Types, Purpose
Learn
6 Minute Read

Intrusion Detection Systems (IDS): Definition, Types, Purpose

An intrusion detection system monitors network traffic for anomalies and cyberattacks. Learn what types of IDS there are and which is right for you.
Previous Security Content Roundups from the Splunk Threat Research Team (STRT)
Security
12 Minute Read

Previous Security Content Roundups from the Splunk Threat Research Team (STRT)

Recap: Learn about the last four quarters of security content from the Splunk Threat Research Team.
The Final Shell: Introducing ShellSweepX
Security
8 Minute Read

The Final Shell: Introducing ShellSweepX

The Splunk Threat Research Team is excited to announce the final tool in the ShellSweep collection: ShellSweepX.