The Coralogix blog

Expert insights, bold ideas, and company news

All Articles

Cyber Security in 2021 – What Happened?

Cyber Security in 2021 – What Happened?

2021 was quite a year. Some things changed, and some things very much stayed the same. The world of cyber security was not immune to this zeitgeist, with...

9 mins read Read Now
Optimized Traffic Mirroring Examples – Part 2

Optimized Traffic Mirroring Examples – Part 2

In a previous post, we looked at an example of a fictional bookstore company and recommended mirroring strategies for that specific scenario. In this post, we’ll be looking...

9 mins read Read Now
DDOS Attacks: How to Protect Yourself from the Political Cyber Attack

DDOS Attacks: How to Protect Yourself from the Political Cyber Attack

In the past 24 hours, funding website GiveSendGo has reported that they’ve been the victim...

5 mins read Read Now
5 Ways Scrum Teams Can Be More Efficient

5 Ways Scrum Teams Can Be More Efficient

With progressive delivery, DevOps, scrum, and agile methodologies, the software delivery process has become faster and more collaborative than ever before. Scrum has emerged as a ubiquitous framework...

7 mins read Read Now
Optimized Security Traffic Mirroring Examples – Part 1

Optimized Security Traffic Mirroring Examples – Part 1

You have to capture everything to investigate security issues thoroughly, right? More often than not,...

8 mins read Read Now
JSON Logging: What, Why, How, & Tips

JSON Logging: What, Why, How, & Tips

When you’re working with large data sets, having that data structured in a way that means you can use software to process and understand it will enable you...

10 mins read Read Now
Five Tricks that Senior Engineers Use When They’re Debugging

Five Tricks that Senior Engineers Use When They’re Debugging

Debugging is a fundamental skill in the arsenal of any engineer. Mistakes happen, and bugs...

7 mins read Read Now
Java Logging: Best Practices for Success With Your Java Application

Java Logging: Best Practices for Success With Your Java Application

Java is used by at least 7.6 Million developers worldwide. Java logging has been a...

20 mins read Read Now
Harnessing AIOps to Improve System Security

Harnessing AIOps to Improve System Security

You’ve probably seen the term AIOps appear as the subject of an article or talk recently, and there’s a reason. AIOps is merging DevOps principles with Artificial Intelligence,...

11 mins read Read Now
Have You Forgotten About Application-Level Security?

Have You Forgotten About Application-Level Security?

Security is one of the most changeable landscapes in technology at the moment. With innovations, come new threats, and it seems like every week brings news of a...

5 mins read Read Now
How We Implemented a Zero-Error Policy Using Coralogix

How We Implemented a Zero-Error Policy Using Coralogix

With dozens of microservices running on multiple production regions, getting to a point where any...

6 mins read Read Now
Comparing REST and GraphQL Monitoring Techniques

Comparing REST and GraphQL Monitoring Techniques

Maintaining an endpoint, especially a customer-facing one, requires constant log monitoring, whether using REST or GraphQL. As the industry has looked for solutions to build a more adaptive...

9 mins read Read Now