The Coralogix blog

Expert insights, bold ideas, and company news

All Articles

coralogix security

How to Detect Log4Shell Events Using Coralogix

What is Log4Shell? The Log4J library is one of the most widely-used logging libraries for Java code. On the 24th of November 2021, Alibaba’s Cloud Security Team found...

6 mins read Read Now

What You Can Learn About Cyber Security from the Biggest Breaches in History

It feels like cybersecurity is dominating the newsfeeds, doesn’t it? There is a reason. Cyberattacks...

10 mins read Read Now

Exciting New Features of Coralogix STA

We at Coralogix, believe that cloud security is not a “nice-to-have” feature – something that only large organizations can benefit from or are entitled to have. We believe...

4 mins read Read Now

How Biden’s Executive Order on Improving Cybersecurity Will Impact Your Systems

President Joe Biden recently signed an executive order which made adhering to cybersecurity standards a...

11 mins read Read Now

5 Strategies for Mitigating Kubernetes Security Risks

Since Google first introduced Kubernetes, it’s become one of the most popular DevOps platforms on...

8 mins read Read Now
security tool arsenal

What’s the Most Powerful Tool in Your Security Arsenal? 

Trying to work out the best security tool is a little like trying to choose...

5 mins read Read Now

Is the New Elasticsearch SSPL License a Threat to Your Business?

Recent changes to the Elasticsearch license could have consequences on your intellectual property. Elasticsearch and...

9 mins read Read Now
network security history

Network Security: The Journey from Chewiness to Zero Trust Networking

Network security has changed a lot over the years, it had to. From wide open...

7 mins read Read Now

Stop Enforcing Security Standards – Start Implementing Policies

In days gone by, highly regulated industries like pharmaceuticals and finance were the biggest targets...

5 mins read Read Now

5 Common Elasticsearch Mistakes That Lead to Data Breaches

Avon and Family Tree aren’t companies you would normally associate with cybersecurity, but this year,...

10 mins read Read Now

SIEM Tutorial: What should a good SIEM Provider do for you?

Modern day Security Information and Event Management (SIEM) tooling enterprise security technology combine systems together...

7 mins read Read Now

Writing Effective Suricata Rules with Examples [Best Practices]

This post will help you write effective Suricata Rules to materially improve your security posture....

8 mins read Read Now