[Live Webinar] Next-Level O11y: Why Every DevOps Team Needs a RUM Strategy Register today!

All Articles

Why is Application Performance Monitoring Important?
6 min

Why is Application Performance Monitoring Important?

AI-powered platforms like Coralogix also have built-in technology that determines your enterprise monitoring system‘s “baseline” and reports anomalies that are difficult to identify in real-time. When…

Kubernetes: Tips, Tricks, Pitfalls, and More
4 min

Kubernetes: Tips, Tricks, Pitfalls, and More

If you’re involved in IT, you’ve likely come across the word “Kubernetes.” It’s a Greek word that means “boat.” It’s one of the most exciting developments…

Elasticsearch Release: Roundup of Change in Version 8.1.0
5 min

Elasticsearch Release: Roundup of Change in Version 8.1.0

Elastic released a major version of its platform on February 10, 2022. Version 8.0.0 is the latest major version. There has already been a new minor…

What is the Most Vulnerable Data My Company Holds?
8 min

What is the Most Vulnerable Data My Company Holds?

Data security is on every priority list in 2022. With the frequency of breaches never higher, many businesses assess their situation and ask cybersecurity questions. With…

What to Watch on EKS – a Guide to Kubernetes Monitoring on AWS
8 min

What to Watch on EKS – a Guide to Kubernetes Monitoring on AWS

It’s impossible to ignore AWS service monitoring as a major player in the public cloud space. With $13.5 billion in revenue in the first quarter of…

What is Red Teaming in Cyber Security? The Complete Guide
12 min

What is Red Teaming in Cyber Security? The Complete Guide

Red teaming explained Red teaming is the practice of asking a trusted group of individuals to launch an attack on your software or your organization so…

Splunk Indexer Vulnerability: What You Need to Know
5 min

Splunk Indexer Vulnerability: What You Need to Know

A new vulnerability, CVE-2021-342 has been discovered in the Splunk indexer component, which is a commonly utilized part of the Splunk Enterprise suite. We’re going to…

AWS Centralized Logging Guide
27 min

AWS Centralized Logging Guide

The key challenge with modern visibility on clouds like AWS is that data originates from various sources across every layer of the application stack, is varied…

How to Tell if You Were Attacked in the Recent Okta Security Breach
5 min

How to Tell if You Were Attacked in the Recent Okta Security Breach

Today, Okta, a leading enterprise identity and access management firm, reported that it had launched an inquiry after the LAPSUS$ hacking group posted screenshots on Telegram….

Where Modern Observability
and Financial Savvy Meet.

Live Webinar
Next-Level O11y: Why Every DevOps Team Needs a RUM Strategy
April 30th at 12pm ET | 6pm CET
Save my Seat