The Coralogix blog

Expert insights, bold ideas, and company news

All Articles

Kubernetes: Tips, Tricks, Pitfalls, and More

Kubernetes: Tips, Tricks, Pitfalls, and More

If you’re involved in IT, you’ve likely come across the word “Kubernetes.” It’s a Greek word that means “boat.” It’s one of the most exciting developments in cloud-native...

4 mins read Read Now
Elasticsearch Release: Roundup of Change in Version 8.1.0

Elasticsearch Release: Roundup of Change in Version 8.1.0

Elastic released a major version of its platform on February 10, 2022. Version 8.0.0 is...

5 mins read Read Now
What is the Most Vulnerable Data My Company Holds?

What is the Most Vulnerable Data My Company Holds?

Data security is on every priority list in 2022. With the frequency of breaches never higher, many businesses assess their situation and ask cybersecurity questions. With cybersecurity policy,...

8 mins read Read Now
What to Watch on EKS – a Guide to Kubernetes Monitoring on AWS

What to Watch on EKS – a Guide to Kubernetes Monitoring on AWS

It’s impossible to ignore AWS service monitoring as a major player in the public cloud...

8 mins read Read Now
What is Red Teaming in Cyber Security? The Complete Guide

What is Red Teaming in Cyber Security? The Complete Guide

Red teaming explained Red teaming is the practice of asking a trusted group of individuals...

12 mins read Read Now
Splunk Indexer Vulnerability: What You Need to Know

Splunk Indexer Vulnerability: What You Need to Know

A new vulnerability, CVE-2021-342 has been discovered in the Splunk indexer component, which is a commonly utilized part of the Splunk Enterprise suite. We’re going to explain the...

5 mins read Read Now
AWS Centralized Logging Guide

AWS Centralized Logging Guide

The key challenge with modern visibility on clouds like AWS is that data originates from various sources across every layer of the application stack, is varied in format,...

27 mins read Read Now
How to Tell if You Were Attacked in the Recent Okta Security Breach

How to Tell if You Were Attacked in the Recent Okta Security Breach

Today, Okta, a leading enterprise identity and access management firm, reported that it had launched...

5 mins read Read Now
3 Metrics to Monitor When Using Elastic Load Balancing

3 Metrics to Monitor When Using Elastic Load Balancing

One of the benefits of deploying software on the cloud is allocating a variable amount...

9 mins read Read Now
We’re Making Our Debut In Cybersecurity with Snowbit

We’re Making Our Debut In Cybersecurity with Snowbit

2021 was a crazy year, to say the least, not only did we welcome our...

3 mins read Read Now
Your Clients Financial Real-Time Data: Five Factors to Keep in Mind

Your Clients Financial Real-Time Data: Five Factors to Keep in Mind

What is real-time data? Real-time data is where information is collected, immediately processed, and then...

6 mins read Read Now
5 Cybersecurity Tools to Safeguard Your Business

5 Cybersecurity Tools to Safeguard Your Business

With the exponential rise in cybercrimes in the last decade, cybersecurity for businesses is no longer an option — it’s a necessity. Fuelled by the forced shift to...

6 mins read Read Now