Our next-gen architecture is built to help you make sense of your ever-growing data. Watch a 4-min demo video!

Coralogix Blog Archive: Security - Page 2

Beating the Security Talent Problem: The SRC Solution
3 min

Beating the Security Talent Problem: The SRC Solution

In an era where digital threats are evolving rapidly, the need for skilled security professionals is at an all-time high. Companies are grappling with a unique…

Okta Threat Advisory from Coralogix
6 min

Okta Threat Advisory from Coralogix

On October 20, 2023, Okta Security confirmed malicious activity that exploits stolen credentials, allowing unauthorized access to the company’s support case management system. Several other vendors…

Sumo Logic Breach: What We Know So Far
3 min

Sumo Logic Breach: What We Know So Far

On the 7th of November, Sumo Logic announced a security incident. Their security team detected the use of a compromised set of credentials to access a…

Security Insights: Over 1,000 Alerts & Dashboards in One Click
4 min

Security Insights: Over 1,000 Alerts & Dashboards in One Click

Ingesting data in the security world is only half of the battle. The second half is fought over insight generation. As security professionals, we understand that every…

Threat Intelligence Feeds: A Complete Overview
7 min

Threat Intelligence Feeds: A Complete Overview

Cybersecurity is all about staying one step ahead of potential threats. With 1802 data compromises impacting over 422 million individuals in the United States in 2022,…

A Guide To Container Security – Best Practices
6 min

A Guide To Container Security – Best Practices

With over 7.3 million docker accounts created in 2021, Docker’s popularity has seen a meteoric rise since its launch in 2013. However, more businesses using it…

Exploit vs. Vulnerability: What Is the Difference?
6 min

Exploit vs. Vulnerability: What Is the Difference?

Whenever engineers discover a new security issue, the question arises every time: is this an exploit or vulnerability? What is a software vulnerability? How does it…

How do Observability and Security Work Together?
9 min

How do Observability and Security Work Together?

There’s no question that the last 18 months have seen a pronounced increase in the sophistication of cyber threats. The technology industry is seeing a macro…

Keeping IaC Secure: Common Security Risks in Infrastructure as Code
10 min

Keeping IaC Secure: Common Security Risks in Infrastructure as Code

What is infrastructure as code (IaC)? Infrastructure as Code (IaC) is the cloud-computing practice of putting the provisioning and configuring your cloud resources into machine-readable code. …

Observability and Security
that Scale with You.