The Coralogix blog
Expert insights, bold ideas, and company news
All Articles
- All
- Alerts
- OpenTelemetry
- Olly
- Uncategorized
- Software development
- AI
- AWS
- Product
- CDN monitoring
- CloudWatch
- Logging
- Real user monitoring
- Data
- Gaming
- APM
- Cloud
- Fintech
- FinOps
- Kubernetes
- Microservices
- Compliance
- Observability
- Metrics
- Security advisory
- Tracing
- CI/CD
- IaC
- Elasticsearch
- Migrations
- DevOps & IT operations
- Troubleshooting
- Service Management
- Company news
- Case studies
- MDR
- Security
- Performance
- Extensions
- Tutorials
- Audit logs
- Infrastructure monitoring
- Logs
- Application performance monitoring
- SRE
- Monitoring
- Log analytics
- DataPrime
Dynamic Bad Actor Scoring in Coralogix
Bad bots, hackers, and other malicious agents can be tracked by a huge volume of metrics – session activity, HTTP headers, response times, request volume & cadence, and...
Palo Alto Global Protect Command Injection Vulnerability
On April 12, 2024, Palo Alto disclosed a critical vulnerability identified as CVE-2024-3400 in its...
Advanced Security: Marking AWS WAF’s Homework
The same security scenarios are checked thoroughly. Privilege escalation, SQL injection, Port scanning and so on. These checks form the bedrock of defensive security, but as solutions become...
Coralogix Alarms: Faster than WAF IP Detection and Remediation
There is one area of technology that requires the fastest possible response time, where every...
Azure Security Compromised – Hundreds Fell Victim to Phishing
In late November 2023, a phishing campaign successfully compromised hundreds of user accounts, including those...
AWS IAM Best Practices
In today’s interconnected digital landscape, robust IAM (Identity and Access Management) practices are critical pillars of an organization’s cybersecurity strategy. IAM serves as the fortress guarding sensitive data,...
What is the Benefit of Including Security with Your Observability Strategy?
Observability strategies are needed to ensure stable and performant applications, especially when complex distributed environments...
FortiGate Firewall – Top 10 Best Practices
FortiGate Next-Generation Firewall utilizes purpose-built security processors and threat intelligence services to deliver protection and high performance, including encrypted traffic inspection. FortiGate reduces complexity with automated visibility into...
Beating the Security Talent Problem: The SRC Solution
In an era where digital threats are evolving rapidly, the need for skilled security professionals...
Okta Threat Advisory from Coralogix
On October 20, 2023, Okta Security confirmed malicious activity that exploits stolen credentials, allowing unauthorized access to the company’s support case management system. Several other vendors such as...
Sumo Logic Breach: What We Know So Far
On the 7th of November, Sumo Logic announced a security incident. Their security team detected the use of a compromised set of credentials to access a Sumo Logic...
Security Insights: Over 1,000 Alerts & Dashboards in One Click
Ingesting data in the security world is only half of the battle. The second half...