The Coralogix blog

Expert insights, bold ideas, and company news

All Articles

Track SBOM Compliance with Coralogix

Track SBOM Compliance with Coralogix

A Software Bill of Materials (SBOM) is essentially an inventory of the components used to build a software artifact, such as an application. While the concept of tracking...

7 mins read Read Now
See the Bigger Picture: How Coralogix Investigations Speeds Up Root Cause Analysis

See the Bigger Picture: How Coralogix Investigations Speeds Up Root Cause Analysis

In the fast-paced world of business, timely and accurate incident investigations are crucial. The ability...

4 mins read Read Now
PCI DSS compliance with SIEM, CSPM and MxDR

PCI DSS compliance with SIEM, CSPM and MxDR

In a world where increasing numbers of transactions are done online, compliance with PCI DSS (Payment Card Industry Data Security Standard) is crucial. However, with more organizations turning...

8 mins read Read Now
Dynamic Bad Actor Scoring in Coralogix

Dynamic Bad Actor Scoring in Coralogix

Bad bots, hackers, and other malicious agents can be tracked by a huge volume of metrics – session activity, HTTP headers, response times, request volume & cadence, and...

7 mins read Read Now
Palo Alto Global Protect Command Injection Vulnerability

Palo Alto Global Protect Command Injection Vulnerability

On April 12, 2024, Palo Alto disclosed a critical vulnerability identified as CVE-2024-3400 in its...

3 mins read Read Now
Advanced Security: Marking AWS WAF’s Homework

Advanced Security: Marking AWS WAF’s Homework

The same security scenarios are checked thoroughly. Privilege escalation, SQL injection, Port scanning and so on. These checks form the bedrock of defensive security, but as solutions become...

6 mins read Read Now
Coralogix Alarms: Faster than WAF IP Detection and Remediation

Coralogix Alarms: Faster than WAF IP Detection and Remediation

There is one area of technology that requires the fastest possible response time, where every...

5 mins read Read Now
Azure Security Compromised – Hundreds Fell Victim to Phishing

Azure Security Compromised – Hundreds Fell Victim to Phishing

In late November 2023, a phishing campaign successfully compromised hundreds of user accounts, including those...

4 mins read Read Now
AWS IAM Best Practices

AWS IAM Best Practices

In today’s interconnected digital landscape, robust IAM (Identity and Access Management) practices are critical pillars of an organization’s cybersecurity strategy. IAM serves as the fortress guarding sensitive data,...

8 mins read Read Now
What is the Benefit of Including Security with Your Observability Strategy?

What is the Benefit of Including Security with Your Observability Strategy?

Observability strategies are needed to ensure stable and performant applications, especially when complex distributed environments...

6 mins read Read Now
FortiGate Firewall – Top 10 Best Practices 

FortiGate Firewall – Top 10 Best Practices 

FortiGate Next-Generation Firewall utilizes purpose-built security processors and threat intelligence services to deliver protection and high performance, including encrypted traffic inspection. FortiGate reduces complexity with automated visibility into...

11 mins read Read Now
Beating the Security Talent Problem: The SRC Solution

Beating the Security Talent Problem: The SRC Solution

In an era where digital threats are evolving rapidly, the need for skilled security professionals...

3 mins read Read Now