The Coralogix blog
Expert insights, bold ideas, and company news
All Articles
- All
- Alerts
- OpenTelemetry
- Uncategorized
- Software development
- AI
- AWS
- Product
- CDN monitoring
- CloudWatch
- Logging
- Real user monitoring
- Data
- Gaming
- APM
- Cloud
- Fintech
- FinOps
- Kubernetes
- Microservices
- Compliance
- Observability
- Metrics
- Security advisory
- Tracing
- CI/CD
- IaC
- Elasticsearch
- Migrations
- DevOps & IT operations
- Troubleshooting
- Service Management
- Company news
- Case studies
- MDR
- Security
- Performance
- Extensions
- Tutorials
- Audit logs
- Infrastructure monitoring
- Logs
- Application performance monitoring
- Monitoring
- Log analytics
Harnessing AIOps to Improve System Security
You’ve probably seen the term AIOps appear as the subject of an article or talk recently, and there’s a reason. AIOps is merging DevOps principles with Artificial Intelligence,...
Have You Forgotten About Application-Level Security?
Security is one of the most changeable landscapes in technology at the moment. With innovations, come new threats, and it seems like every week brings news of a...
How to Detect Log4Shell Events Using Coralogix
What is Log4Shell? The Log4J library is one of the most widely-used logging libraries for Java code. On the 24th of November 2021, Alibaba’s Cloud Security Team found...
What You Can Learn About Cyber Security from the Biggest Breaches in History
It feels like cybersecurity is dominating the newsfeeds, doesn’t it? There is a reason. Cyberattacks...
Exciting New Features of Coralogix STA
We at Coralogix, believe that cloud security is not a “nice-to-have” feature – something that only large organizations can benefit from or are entitled to have. We believe...
How Biden’s Executive Order on Improving Cybersecurity Will Impact Your Systems
President Joe Biden recently signed an executive order which made adhering to cybersecurity standards a...
5 Strategies for Mitigating Kubernetes Security Risks
Since Google first introduced Kubernetes, it’s become one of the most popular DevOps platforms on...
What’s the Most Powerful Tool in Your Security Arsenal?
Trying to work out the best security tool is a little like trying to choose...
Is the New Elasticsearch SSPL License a Threat to Your Business?
Recent changes to the Elasticsearch license could have consequences on your intellectual property. Elasticsearch and...
Network Security: The Journey from Chewiness to Zero Trust Networking
Network security has changed a lot over the years, it had to. From wide open...
Stop Enforcing Security Standards – Start Implementing Policies
In days gone by, highly regulated industries like pharmaceuticals and finance were the biggest targets...
5 Common Elasticsearch Mistakes That Lead to Data Breaches
Avon and Family Tree aren’t companies you would normally associate with cybersecurity, but this year,...