[Live Webinar] Next-Level O11y: Why Every DevOps Team Needs a RUM Strategy Register today!

Security

Advanced Security: Marking AWS WAF’s Homework
6 min

Advanced Security: Marking AWS WAF’s Homework

The same security scenarios are checked thoroughly. Privilege escalation, SQL injection, Port scanning and so on. These checks form the bedrock of defensive security, but as…

Coralogix Alarms: Faster than WAF IP Detection and Remediation
5 min

Coralogix Alarms: Faster than WAF IP Detection and Remediation

There is one area of technology that requires the fastest possible response time, where every second has potentially enormous implications – security. Coralogix fits the security…

Azure Security Compromised – Hundreds Fell Victim to Phishing
4 min

Azure Security Compromised – Hundreds Fell Victim to Phishing

In late November 2023, a phishing campaign successfully compromised hundreds of user accounts, including those belonging to high-ranking executives, across dozens of Microsoft Azure environments. Cybercriminals…

AWS IAM Best Practices
8 min

AWS IAM Best Practices

In today’s interconnected digital landscape, robust IAM (Identity and Access Management) practices are critical pillars of an organization’s cybersecurity strategy. IAM serves as the fortress guarding…

What is the Benefit of Including Security with Your Observability Strategy?
6 min

What is the Benefit of Including Security with Your Observability Strategy?

Observability strategies are needed to ensure stable and performant applications, especially when complex distributed environments back them. Large volumes of observability data are collected to support…

FortiGate Firewall – Top 10 Best Practices 
11 min

FortiGate Firewall – Top 10 Best Practices 

FortiGate Next-Generation Firewall utilizes purpose-built security processors and threat intelligence services to deliver protection and high performance, including encrypted traffic inspection. FortiGate reduces complexity with automated…

Beating the Security Talent Problem: The SRC Solution
3 min

Beating the Security Talent Problem: The SRC Solution

In an era where digital threats are evolving rapidly, the need for skilled security professionals is at an all-time high. Companies are grappling with a unique…

Okta Threat Advisory from Coralogix
6 min

Okta Threat Advisory from Coralogix

On October 20, 2023, Okta Security confirmed malicious activity that exploits stolen credentials, allowing unauthorized access to the company’s support case management system. Several other vendors…

Sumo Logic Breach: What We Know So Far
3 min

Sumo Logic Breach: What We Know So Far

On the 7th of November, Sumo Logic announced a security incident. Their security team detected the use of a compromised set of credentials to access a…

Where Modern Observability
and Financial Savvy Meet.

Live Webinar
Next-Level O11y: Why Every DevOps Team Needs a RUM Strategy
April 30th at 12pm ET | 6pm CET
Save my Seat