The Coralogix blog

Expert insights, bold ideas, and company news

All Articles

IoT Security: How Important are Logs for System?

IoT Security: How Important are Logs for System?

IoT has rapidly moved from a fringe technology to a mainstream collection of techniques, protocols, and applications that better enable you to support and monitor a highly distributed,...

5 mins read Read Now
Cyber Security in 2021 – What Happened?

Cyber Security in 2021 – What Happened?

2021 was quite a year. Some things changed, and some things very much stayed the same. The world of cyber security was not immune to this zeitgeist, with...

9 mins read Read Now
Optimized Traffic Mirroring Examples – Part 2

Optimized Traffic Mirroring Examples – Part 2

In a previous post, we looked at an example of a fictional bookstore company and recommended mirroring strategies for that specific scenario. In this post, we’ll be looking...

9 mins read Read Now
DDOS Attacks: How to Protect Yourself from the Political Cyber Attack

DDOS Attacks: How to Protect Yourself from the Political Cyber Attack

In the past 24 hours, funding website GiveSendGo has reported that they’ve been the victim...

5 mins read Read Now
Optimized Security Traffic Mirroring Examples – Part 1

Optimized Security Traffic Mirroring Examples – Part 1

You have to capture everything to investigate security issues thoroughly, right? More often than not,...

8 mins read Read Now
Harnessing AIOps to Improve System Security

Harnessing AIOps to Improve System Security

You’ve probably seen the term AIOps appear as the subject of an article or talk recently, and there’s a reason. AIOps is merging DevOps principles with Artificial Intelligence,...

11 mins read Read Now
Have You Forgotten About Application-Level Security?

Have You Forgotten About Application-Level Security?

Security is one of the most changeable landscapes in technology at the moment. With innovations, come new threats, and it seems like every week brings news of a...

5 mins read Read Now
How to Detect Log4Shell Events Using Coralogix

How to Detect Log4Shell Events Using Coralogix

What is Log4Shell? The Log4J library is one of the most widely-used logging libraries for Java code. On the 24th of November 2021, Alibaba’s Cloud Security Team found...

6 mins read Read Now
What You Can Learn About Cyber Security from the Biggest Breaches in History

What You Can Learn About Cyber Security from the Biggest Breaches in History

It feels like cybersecurity is dominating the newsfeeds, doesn’t it? There is a reason. Cyberattacks...

10 mins read Read Now
Exciting New Features of Coralogix STA

Exciting New Features of Coralogix STA

We at Coralogix, believe that cloud security is not a “nice-to-have” feature – something that only large organizations can benefit from or are entitled to have. We believe...

4 mins read Read Now
How Biden’s Executive Order on Improving Cybersecurity Will Impact Your Systems

How Biden’s Executive Order on Improving Cybersecurity Will Impact Your Systems

President Joe Biden recently signed an executive order which made adhering to cybersecurity standards a...

11 mins read Read Now
5 Strategies for Mitigating Kubernetes Security Risks

5 Strategies for Mitigating Kubernetes Security Risks

Since Google first introduced Kubernetes, it’s become one of the most popular DevOps platforms on...

8 mins read Read Now