[Live Webinar] Unlocking real-time AI Observability with Coralogix's AI Center

Register Now

Coralogix Blog Archive: Security - Page 5

Exciting New Features of Coralogix STA
4 min

Exciting New Features of Coralogix STA

We at Coralogix, believe that cloud security is not a “nice-to-have” feature – something that only large organizations can benefit from or are entitled to have….

How Biden’s Executive Order on Improving Cybersecurity Will Impact Your Systems
11 min

How Biden’s Executive Order on Improving Cybersecurity Will Impact Your Systems

President Joe Biden recently signed an executive order which made adhering to cybersecurity standards a legal requirement for federal departments and agencies. The move was not…

5 Strategies for Mitigating Kubernetes Security Risks
8 min

5 Strategies for Mitigating Kubernetes Security Risks

Since Google first introduced Kubernetes, it’s become one of the most popular DevOps platforms on the market. Unfortunately, increasingly widespread usage has made Kubernetes a growing…

What’s the Most Powerful Tool in Your Security Arsenal? 
5 min

What’s the Most Powerful Tool in Your Security Arsenal? 

Trying to work out the best security tool is a little like trying to choose a golf club three shots ahead – you don’t know what…

Is the New Elasticsearch SSPL License a Threat to Your Business?
9 min

Is the New Elasticsearch SSPL License a Threat to Your Business?

Recent changes to the Elasticsearch license could have consequences on your intellectual property. Elasticsearch and Kibana as recently published by Elastic will no longer be licensed…

Network Security: The Journey from Chewiness to Zero Trust Networking
7 min

Network Security: The Journey from Chewiness to Zero Trust Networking

Network security has changed a lot over the years, it had to. From wide open infrastructures to tightly controlled environments, the standard practices of network security…

Stop Enforcing Security Standards – Start Implementing Policies
5 min

Stop Enforcing Security Standards – Start Implementing Policies

In days gone by, highly regulated industries like pharmaceuticals and finance were the biggest targets for nefarious cyber actors, due to the financial resources at banks…

5 Common Elasticsearch Mistakes That Lead to Data Breaches
10 min

5 Common Elasticsearch Mistakes That Lead to Data Breaches

Avon and Family Tree aren’t companies you would normally associate with cybersecurity, but this year, all three were on the wrong side of it when they…

SIEM Tutorial: What should a good SIEM Provider do for you?
7 min

SIEM Tutorial: What should a good SIEM Provider do for you?

Modern day Security Information and Event Management (SIEM) tooling enterprise security technology combine systems together for a comprehensive view of IT security. This can be tricky,…

Observability and Security
that Scale with You.

Enterprise-Grade Solution