The Coralogix blog
Expert insights, bold ideas, and company news
All Articles
- All
- Alerts
- OpenTelemetry
- Uncategorized
- Software development
- AI
- AWS
- Product
- CDN monitoring
- CloudWatch
- Logging
- Real user monitoring
- Data
- Gaming
- APM
- Cloud
- Fintech
- FinOps
- Kubernetes
- Microservices
- Compliance
- Observability
- Metrics
- Security advisory
- Tracing
- CI/CD
- IaC
- Elasticsearch
- Migrations
- DevOps & IT operations
- Troubleshooting
- Company news
- Case studies
- Security
- Performance
- Tutorials
- Audit logs
- Logs
- Application performance monitoring
- Monitoring
- Log analytics
FortiGate Firewall – Top 10 Best Practices
FortiGate Next-Generation Firewall utilizes purpose-built security processors and threat intelligence services to deliver protection and high performance, including encrypted traffic inspection. FortiGate reduces complexity with automated visibility into...
Beating the Security Talent Problem: The SRC Solution
In an era where digital threats are evolving rapidly, the need for skilled security professionals...
Okta Threat Advisory from Coralogix
On October 20, 2023, Okta Security confirmed malicious activity that exploits stolen credentials, allowing unauthorized access to the company’s support case management system. Several other vendors such as...
Sumo Logic Breach: What We Know So Far
On the 7th of November, Sumo Logic announced a security incident. Their security team detected the use of a compromised set of credentials to access a Sumo Logic...
Security Insights: Over 1,000 Alerts & Dashboards in One Click
Ingesting data in the security world is only half of the battle. The second half...
Threat Intelligence Feeds: A Complete Overview
Cybersecurity is all about staying one step ahead of potential threats. With 1802 data compromises impacting over 422 million individuals in the United States in 2022, threat intelligence...
A Guide To Container Security – Best Practices
With over 7.3 million docker accounts created in 2021, Docker’s popularity has seen a meteoric rise since its launch in 2013. However, more businesses using it also means...
Exploit vs. Vulnerability: What Is the Difference?
Whenever engineers discover a new security issue, the question arises every time: is this an exploit or vulnerability? What is a software vulnerability? How does it differ from...
How do Observability and Security Work Together?
There’s no question that the last 18 months have seen a pronounced increase in the sophistication of cyber threats. The technology industry is seeing a macro effect of...
Keeping IaC Secure: Common Security Risks in Infrastructure as Code
What is infrastructure as code (IaC)? Infrastructure as Code (IaC) is the cloud-computing practice of...
How to Use SIEM Tools in the Modern World
In our highly connected world, organizations of all sizes need to be alert to the risk of cyberattacks. The genuine threats to today’s enterprises include data leaks, ransomware,...
What is a Security Whitelist?
In April 2022 alone, there were 14.3m records breached due to 80 significant security incidents. These incidents make up a complex, shifting landscape of cyberattacks that require increasingly...