Breaking News from AWS re:Invent
Coralogix receives AWS Rising Star award!

All Articles

We’re Making Our Debut In Cybersecurity with Snowbit
3 min

We’re Making Our Debut In Cybersecurity with Snowbit

2021 was a crazy year, to say the least, not only did we welcome our 2,000th customer, we announced our Series B AND Series C funding…

Your Clients Financial Real-Time Data: Five Factors to Keep in Mind
6 min

Your Clients Financial Real-Time Data: Five Factors to Keep in Mind

What is real-time data? Real-time data is where information is collected, immediately processed, and then delivered to users to make informed decisions at the moment. Health…

5 Cybersecurity Tools to Safeguard Your Business
6 min

5 Cybersecurity Tools to Safeguard Your Business

With the exponential rise in cybercrimes in the last decade, cybersecurity for businesses is no longer an option — it’s a necessity. Fuelled by the forced…

How to Setup AWS CloudWatch Agent Using AWS Systems Manager
8 min

How to Setup AWS CloudWatch Agent Using AWS Systems Manager

What is AWS Systems Manager Before we jump into this, it’s important to note that older names, and still in use in some areas of AWS,…

What is scripting?
7 min

What is scripting?

Like all programming, scripting is a way of providing instructions to a computer so you can tell it what to do and when to do it….

Using Lambda Extensions to Streamline Observability
8 min

Using Lambda Extensions to Streamline Observability

Lambda Observability Lambda is a top-rated compute service available on the AWS cloud service network. Its popularity largely derives from its ease of use, allowing users…

IoT Security: How Important are Logs for System?
5 min

IoT Security: How Important are Logs for System?

IoT has rapidly moved from a fringe technology to a mainstream collection of techniques, protocols, and applications that better enable you to support and monitor a…

Cyber Security in 2021 – What Happened?
9 min

Cyber Security in 2021 – What Happened?

2021 was quite a year. Some things changed, and some things very much stayed the same. The world of cyber security was not immune to this…

Optimized Traffic Mirroring Examples – Part 2
9 min

Optimized Traffic Mirroring Examples – Part 2

In a previous post, we looked at an example of a fictional bookstore company and recommended mirroring strategies for that specific scenario. In this post, we’ll…

Your data is telling yesterday’s story —
Find out what it can tell you today.

Live Webinar Series
Masterclass: Monitoring as Code
Register today to uncover real-world use cases across diverse industries, advanced practices and techniques, and the critical tools for successful implementation.
Save my Seat