The Coralogix blog

Expert insights, bold ideas, and company news

All Articles

A Guide To Container Security – Best Practices

A Guide To Container Security – Best Practices

With over 7.3 million docker accounts created in 2021, Docker’s popularity has seen a meteoric rise since its launch in 2013. However, more businesses using it also means...

6 mins read Read Now
Exploit vs. Vulnerability: What Is the Difference?

Exploit vs. Vulnerability: What Is the Difference?

Whenever engineers discover a new security issue, the question arises every time: is this an exploit or vulnerability? What is a software vulnerability? How does it differ from...

6 mins read Read Now
How do Observability and Security Work Together?

How do Observability and Security Work Together?

There’s no question that the last 18 months have seen a pronounced increase in the sophistication of cyber threats. The technology industry is seeing a macro effect of...

9 mins read Read Now
Keeping IaC Secure: Common Security Risks in Infrastructure as Code

Keeping IaC Secure: Common Security Risks in Infrastructure as Code

What is infrastructure as code (IaC)? Infrastructure as Code (IaC) is the cloud-computing practice of...

10 mins read Read Now
How to Use SIEM Tools in the Modern World

How to Use SIEM Tools in the Modern World

In our highly connected world, organizations of all sizes need to be alert to the risk of cyberattacks. The genuine threats to today’s enterprises include data leaks, ransomware,...

8 mins read Read Now
What is a Security Whitelist?

What is a Security Whitelist?

In April 2022 alone, there were 14.3m records breached due to 80 significant security incidents. These incidents make up a complex, shifting landscape of cyberattacks that require increasingly...

6 mins read Read Now
What is the Most Vulnerable Data My Company Holds?

What is the Most Vulnerable Data My Company Holds?

Data security is on every priority list in 2022. With the frequency of breaches never higher, many businesses assess their situation and ask cybersecurity questions. With cybersecurity policy,...

8 mins read Read Now
What is Red Teaming in Cyber Security? The Complete Guide

What is Red Teaming in Cyber Security? The Complete Guide

Red teaming explained Red teaming is the practice of asking a trusted group of individuals...

12 mins read Read Now
Splunk Indexer Vulnerability: What You Need to Know

Splunk Indexer Vulnerability: What You Need to Know

A new vulnerability, CVE-2021-342 has been discovered in the Splunk indexer component, which is a commonly utilized part of the Splunk Enterprise suite. We’re going to explain the...

5 mins read Read Now
How to Tell if You Were Attacked in the Recent Okta Security Breach

How to Tell if You Were Attacked in the Recent Okta Security Breach

Today, Okta, a leading enterprise identity and access management firm, reported that it had launched...

5 mins read Read Now
5 Cybersecurity Tools to Safeguard Your Business

5 Cybersecurity Tools to Safeguard Your Business

With the exponential rise in cybercrimes in the last decade, cybersecurity for businesses is no longer an option — it’s a necessity. Fuelled by the forced shift to...

6 mins read Read Now
IoT Security: How Important are Logs for System?

IoT Security: How Important are Logs for System?

IoT has rapidly moved from a fringe technology to a mainstream collection of techniques, protocols, and applications that better enable you to support and monitor a highly distributed,...

5 mins read Read Now