The Coralogix blog

Expert insights, bold ideas, and company news

All Articles

The AWS logs you miss during an incident

The AWS logs you miss during an incident

Incident response in the cloud is derailed not by a lack of skill, but by a lack of visibility. Security teams frequently discover critical blind spots only after...

14 mins read Read Now
Slack, Teams & Google Chat in Your SIEM: Why Collaboration Audit Logs Matter

Slack, Teams & Google Chat in Your SIEM: Why Collaboration Audit Logs Matter

The modern workplace has a new “system of record,” and it isn’t email. Today, approvals,...

6 mins read Read Now
Hybrid Cloud Defense Grid: Bridging Wiz and Runtime Telemetry

Hybrid Cloud Defense Grid: Bridging Wiz and Runtime Telemetry

The modern cloud security landscape is often fighting a war on two disconnected fronts. On...

3 mins read Read Now
Threat hunting with Olly

Threat hunting with Olly

Effective threat hunting requires both comprehensive visibility and quick, data-driven insights. Olly, the AI-powered observability teammate within Coralogix, provides just that. Whether you’re tracking lateral movement, uncovering stealthy...

13 mins read Read Now
Building visibility and resilience across Kubernetes

Building visibility and resilience across Kubernetes

Why Kubernetes Security and Monitoring Matter Kubernetes has transformed how modern applications are deployed and scaled. Its flexibility and automation power innovation but also expand the attack surface....

6 mins read Read Now
Mastering OWASP Detection: Enterprise Rules for AWS, Akamai, F5, and Cloudflare

Mastering OWASP Detection: Enterprise Rules for AWS, Akamai, F5, and Cloudflare

Application Security, WAF, and OWASP form an interconnected defense strategy for web applications. OWASP (Open...

12 mins read Read Now
Turn AI ambition into secure operations

Turn AI ambition into secure operations

If you attended AWS re:Invent last year, it probably felt like there was an AI solution for everything. Models, copilots, agents; by the end, someone had to pitch...

5 mins read Read Now
Smarter SIEM starts here: Context, speed, and the power of MCP

Smarter SIEM starts here: Context, speed, and the power of MCP

Traditional SIEMs were built for a simpler time, when infrastructure was static, data was structured,...

6 mins read Read Now
Coralogix Expands Unified Threat Intelligence Coverage

Coralogix Expands Unified Threat Intelligence Coverage

Coralogix is excited to announce a major enhancement to our Unified Threat Intelligence (UTI) capabilities...

2 mins read Read Now
Raising the Bar in Observability and Security: Coralogix Extensions at Scale

Raising the Bar in Observability and Security: Coralogix Extensions at Scale

In today’s high-velocity digital ecosystem, visibility isn’t enough. SREs and engineering leaders need real-time insights,...

3 mins read Read Now
GitHub Action Supply Chain Attack (CVE-2025-30066)

GitHub Action Supply Chain Attack (CVE-2025-30066)

Summary On March 14, 2025, a critical supply chain attack targeted the widely used GitHub Action tj-actions/changed-files. This action, utilized in over 23,000 repositories, was compromised when attackers...

4 mins read Read Now
The Digital Operational Resilience Act (DORA) is coming – are you ready?

The Digital Operational Resilience Act (DORA) is coming – are you ready?

As the official implementation date approaches for the Digital Operational Resilience Act (DORA) – financial...

6 mins read Read Now