The Coralogix blog
Expert insights, bold ideas, and company news
All Articles
- All
- Alerts
- OpenTelemetry
- Olly
- Uncategorized
- Software development
- AI
- Cases
- AWS
- Product
- CDN monitoring
- CloudWatch
- Logging
- Real user monitoring
- SIEM
- Data
- Gaming
- APM
- Cloud
- Fintech
- FinOps
- Kubernetes
- Microservices
- Compliance
- Observability
- Metrics
- Security advisory
- Tracing
- CI/CD
- IaC
- Elasticsearch
- Migrations
- DevOps & IT operations
- Troubleshooting
- Service Management
- Company news
- Case studies
- MDR
- Security
- Performance
- Extensions
- Tutorials
- Audit logs
- Infrastructure monitoring
- Logs
- Application performance monitoring
- SRE
- Monitoring
- Log analytics
- DataPrime
Splunk Indexer Vulnerability: What You Need to Know
A new vulnerability, CVE-2021-342 has been discovered in the Splunk indexer component, which is a commonly utilized part of the Splunk Enterprise suite. We’re going to explain the...
How to Tell if You Were Attacked in the Recent Okta Security Breach
Today, Okta, a leading enterprise identity and access management firm, reported that it had launched...
5 Cybersecurity Tools to Safeguard Your Business
With the exponential rise in cybercrimes in the last decade, cybersecurity for businesses is no longer an option — it’s a necessity. Fuelled by the forced shift to...
IoT Security: How Important are Logs for System?
IoT has rapidly moved from a fringe technology to a mainstream collection of techniques, protocols, and applications that better enable you to support and monitor a highly distributed,...
Cyber Security in 2021 – What Happened?
2021 was quite a year. Some things changed, and some things very much stayed the same. The world of cyber security was not immune to this zeitgeist, with...
Optimized Traffic Mirroring Examples – Part 2
In a previous post, we looked at an example of a fictional bookstore company and recommended mirroring strategies for that specific scenario. In this post, we’ll be looking...
DDOS Attacks: How to Protect Yourself from the Political Cyber Attack
In the past 24 hours, funding website GiveSendGo has reported that they’ve been the victim...
Optimized Security Traffic Mirroring Examples – Part 1
You have to capture everything to investigate security issues thoroughly, right? More often than not,...
Harnessing AIOps to Improve System Security
You’ve probably seen the term AIOps appear as the subject of an article or talk recently, and there’s a reason. AIOps is merging DevOps principles with Artificial Intelligence,...
Have You Forgotten About Application-Level Security?
Security is one of the most changeable landscapes in technology at the moment. With innovations, come new threats, and it seems like every week brings news of a...
How to Detect Log4Shell Events Using Coralogix
What is Log4Shell? The Log4J library is one of the most widely-used logging libraries for Java code. On the 24th of November 2021, Alibaba’s Cloud Security Team found...
What You Can Learn About Cyber Security from the Biggest Breaches in History
It feels like cybersecurity is dominating the newsfeeds, doesn’t it? There is a reason. Cyberattacks...