The Coralogix blog

Expert insights, bold ideas, and company news

All Articles

Building visibility and resilience across Kubernetes

Building visibility and resilience across Kubernetes

Why Kubernetes Security and Monitoring Matter Kubernetes has transformed how modern applications are deployed and scaled. Its flexibility and automation power innovation but also expand the attack surface....

6 mins read Read Now
Mastering OWASP Detection: Enterprise Rules for AWS, Akamai, F5, and Cloudflare

Mastering OWASP Detection: Enterprise Rules for AWS, Akamai, F5, and Cloudflare

Application Security, WAF, and OWASP form an interconnected defense strategy for web applications. OWASP (Open...

12 mins read Read Now
Turn AI ambition into secure operations

Turn AI ambition into secure operations

If you attended AWS re:Invent last year, it probably felt like there was an AI solution for everything. Models, copilots, agents; by the end, someone had to pitch...

5 mins read Read Now
Smarter SIEM starts here: Context, speed, and the power of MCP

Smarter SIEM starts here: Context, speed, and the power of MCP

Traditional SIEMs were built for a simpler time, when infrastructure was static, data was structured,...

6 mins read Read Now
Coralogix Expands Unified Threat Intelligence Coverage

Coralogix Expands Unified Threat Intelligence Coverage

Coralogix is excited to announce a major enhancement to our Unified Threat Intelligence (UTI) capabilities...

2 mins read Read Now
Raising the Bar in Observability and Security: Coralogix Extensions at Scale

Raising the Bar in Observability and Security: Coralogix Extensions at Scale

In today’s high-velocity digital ecosystem, visibility isn’t enough. SREs and engineering leaders need real-time insights,...

3 mins read Read Now
GitHub Action Supply Chain Attack (CVE-2025-30066)

GitHub Action Supply Chain Attack (CVE-2025-30066)

Summary On March 14, 2025, a critical supply chain attack targeted the widely used GitHub Action tj-actions/changed-files. This action, utilized in over 23,000 repositories, was compromised when attackers...

4 mins read Read Now
The Digital Operational Resilience Act (DORA) is coming – are you ready?

The Digital Operational Resilience Act (DORA) is coming – are you ready?

As the official implementation date approaches for the Digital Operational Resilience Act (DORA) – financial...

6 mins read Read Now
Track SBOM Compliance with Coralogix

Track SBOM Compliance with Coralogix

A Software Bill of Materials (SBOM) is essentially an inventory of the components used to build a software artifact, such as an application. While the concept of tracking...

7 mins read Read Now
See the Bigger Picture: How Coralogix Investigations Speeds Up Root Cause Analysis

See the Bigger Picture: How Coralogix Investigations Speeds Up Root Cause Analysis

In the fast-paced world of business, timely and accurate incident investigations are crucial. The ability...

4 mins read Read Now
PCI DSS compliance with SIEM, CSPM and MxDR

PCI DSS compliance with SIEM, CSPM and MxDR

In a world where increasing numbers of transactions are done online, compliance with PCI DSS (Payment Card Industry Data Security Standard) is crucial. However, with more organizations turning...

8 mins read Read Now
Dynamic Bad Actor Scoring in Coralogix

Dynamic Bad Actor Scoring in Coralogix

Bad bots, hackers, and other malicious agents can be tracked by a huge volume of metrics – session activity, HTTP headers, response times, request volume & cadence, and...

7 mins read Read Now