The Coralogix blog

Expert insights, bold ideas, and company news

All Articles

What’s the Most Powerful Tool in Your Security Arsenal? 

What’s the Most Powerful Tool in Your Security Arsenal? 

Trying to work out the best security tool is a little like trying to choose...

5 mins read Read Now
Is the New Elasticsearch SSPL License a Threat to Your Business?

Is the New Elasticsearch SSPL License a Threat to Your Business?

Recent changes to the Elasticsearch license could have consequences on your intellectual property. Elasticsearch and...

9 mins read Read Now
Network Security: The Journey from Chewiness to Zero Trust Networking

Network Security: The Journey from Chewiness to Zero Trust Networking

Network security has changed a lot over the years, it had to. From wide open...

7 mins read Read Now
Stop Enforcing Security Standards – Start Implementing Policies

Stop Enforcing Security Standards – Start Implementing Policies

In days gone by, highly regulated industries like pharmaceuticals and finance were the biggest targets...

5 mins read Read Now
5 Common Elasticsearch Mistakes That Lead to Data Breaches

5 Common Elasticsearch Mistakes That Lead to Data Breaches

Avon and Family Tree aren’t companies you would normally associate with cybersecurity, but this year,...

10 mins read Read Now
SIEM Tutorial: What should a good SIEM Provider do for you?

SIEM Tutorial: What should a good SIEM Provider do for you?

Modern day Security Information and Event Management (SIEM) tooling enterprise security technology combine systems together...

7 mins read Read Now
Writing Effective Suricata Rules with Examples [Best Practices]

Writing Effective Suricata Rules with Examples [Best Practices]

This post will help you write effective Suricata Rules to materially improve your security posture....

8 mins read Read Now
The Cloud Network Security Gap

The Cloud Network Security Gap

Before we dive into the gap in cloud network security, let’s take a step back. If you’ve been in Operations for a while, you might remember how it...

13 mins read Read Now
Elasticsearch Vulnerability: How to Remediate the Most Recent Issues

Elasticsearch Vulnerability: How to Remediate the Most Recent Issues

An Elastic Security Advisory (ESA) is a notice from Elastic to its users of a...

6 mins read Read Now
How SIEM is evolving in 2020

How SIEM is evolving in 2020

The evolution of Security Information and Event Management (SIEM) is deeply intertwined with cloud computing, both in terms of technological breakthroughs the cloud provided and from its inherent...

8 mins read Read Now
Using Auditbeat to protect your critical infrastructure

Using Auditbeat to protect your critical infrastructure

What are Beats Beats are lightweight, purpose-built agents that acquire data and then feed it...

10 mins read Read Now
Does Complexity Equal Security?

Does Complexity Equal Security?

“Teacher somewhere in India: The world you see is supported by a giant turtle. Student: And what holds this giant turtle down? Teacher: Another giant turtle, of course....

8 mins read Read Now