Our next-gen architecture is built to help you make sense of your ever-growing data.

Watch a 4-min demo video!

Coralogix Blog Archive: Security

The Digital Operational Resilience Act (DORA) is coming – are you ready?
6 min

The Digital Operational Resilience Act (DORA) is coming – are you ready?

As the official implementation date approaches for the Digital Operational Resilience Act (DORA) – financial institutions and their information and communication technology (ICT) service providers, across…

Track SBOM Compliance with Coralogix
7 min

Track SBOM Compliance with Coralogix

A Software Bill of Materials (SBOM) is essentially an inventory of the components used to build a software artifact, such as an application. While the concept…

See the Bigger Picture: How Coralogix Investigations Speeds Up Root Cause Analysis
4 min

See the Bigger Picture: How Coralogix Investigations Speeds Up Root Cause Analysis

In the fast-paced world of business, timely and accurate incident investigations are crucial. The ability to piece together evidence, understand the timeline, and collaborate effectively is…

PCI DSS compliance with SIEM, CSPM and MxDR
8 min

PCI DSS compliance with SIEM, CSPM and MxDR

In a world where increasing numbers of transactions are done online, compliance with PCI DSS (Payment Card Industry Data Security Standard) is crucial. However, with more…

Dynamic Bad Actor Scoring in Coralogix
7 min

Dynamic Bad Actor Scoring in Coralogix

Bad bots, hackers, and other malicious agents can be tracked by a huge volume of metrics – session activity, HTTP headers, response times, request volume &…

Palo Alto Global Protect Command Injection Vulnerability
3 min

Palo Alto Global Protect Command Injection Vulnerability

On April 12, 2024, Palo Alto disclosed a critical vulnerability identified as CVE-2024-3400 in its PAN OS operating system, which carries the highest severity rating of…

Advanced Security: Marking AWS WAF’s Homework
6 min

Advanced Security: Marking AWS WAF’s Homework

The same security scenarios are checked thoroughly. Privilege escalation, SQL injection, Port scanning and so on. These checks form the bedrock of defensive security, but as…

Coralogix Alarms: Faster than WAF IP Detection and Remediation
5 min

Coralogix Alarms: Faster than WAF IP Detection and Remediation

There is one area of technology that requires the fastest possible response time, where every second has potentially enormous implications – security. Coralogix fits the security…

Azure Security Compromised – Hundreds Fell Victim to Phishing
4 min

Azure Security Compromised – Hundreds Fell Victim to Phishing

In late November 2023, a phishing campaign successfully compromised hundreds of user accounts, including those belonging to high-ranking executives, across dozens of Microsoft Azure environments. Cybercriminals…

Observability and Security
that Scale with You.

Enterprise-Grade Solution