The Coralogix blog

Expert insights, bold ideas, and company news

All Articles

The Cloud Network Security Gap

Before we dive into the gap in cloud network security, let’s take a step back. If you’ve been in Operations for a while, you might remember how it...

13 mins read Read Now

Elasticsearch Vulnerability: How to Remediate the Most Recent Issues

An Elastic Security Advisory (ESA) is a notice from Elastic to its users of a...

6 mins read Read Now

How SIEM is evolving in 2020

The evolution of Security Information and Event Management (SIEM) is deeply intertwined with cloud computing, both in terms of technological breakthroughs the cloud provided and from its inherent...

8 mins read Read Now

Using Auditbeat to protect your critical infrastructure

What are Beats Beats are lightweight, purpose-built agents that acquire data and then feed it...

10 mins read Read Now

Does Complexity Equal Security?

“Teacher somewhere in India: The world you see is supported by a giant turtle. Student: And what holds this giant turtle down? Teacher: Another giant turtle, of course....

8 mins read Read Now

The who, the what, the where & when, the why & some AI

When you hear the word “permission” what’s the first thing that comes to mind? For...

5 mins read Read Now

Does Open Source Equal Free?

Open source tools have been gaining momentum in recent years, largely due to the contribution of several factors, including improved user interfaces, the inability of commercial companies to...

12 mins read Read Now

Achieve better AWS security with just 10 Cloudtrail logs alerts

CloudTrail logs track actions taken by a user, role, or an AWS service, whether taken...

5 mins read Read Now