The Coralogix blog

Expert insights, bold ideas, and company news

All Articles

Palo Alto Global Protect Command Injection Vulnerability

Palo Alto Global Protect Command Injection Vulnerability

On April 12, 2024, Palo Alto disclosed a critical vulnerability identified as CVE-2024-3400 in its...

3 mins read Read Now
Sumo Logic Flex Pricing: Is usage pricing a good idea?

Sumo Logic Flex Pricing: Is usage pricing a good idea?

When discussing observability pricing models, there are three dimensions that must be considered The first,...

6 mins read Read Now
What If You Could Pull Metrics Out of Your Events?

What If You Could Pull Metrics Out of Your Events?

As data keeps growing at incredible rates, it’s becoming increasingly difficult to store and monitor at a reasonable cost leaving you to cherry-pick which data to store. As...

4 mins read Read Now
Advanced Security: Marking AWS WAF’s Homework

Advanced Security: Marking AWS WAF’s Homework

The same security scenarios are checked thoroughly. Privilege escalation, SQL injection, Port scanning and so on. These checks form the bedrock of defensive security, but as solutions become...

6 mins read Read Now
What you’re currently missing from your CDN monitoring tool

What you’re currently missing from your CDN monitoring tool

Content Delivery Networks (CDN) have been an inherent part of modern software infrastructure for years....

6 mins read Read Now
Coralogix Alarms: Faster than WAF IP Detection and Remediation

Coralogix Alarms: Faster than WAF IP Detection and Remediation

There is one area of technology that requires the fastest possible response time, where every...

5 mins read Read Now
Coralogix and observability at the edge

Coralogix and observability at the edge

Observing Edge & WAF solutions is challenging. There are a host of unique problems to overcome, including security complexities and traffic intent identification. Let’s explore the complexities of...

4 mins read Read Now
Signs You Are Suffering From Alert Fatigue

Signs You Are Suffering From Alert Fatigue

In an IT environment with multiple alerting channels and notifications, it is easy to become overwhelmed and desensitized to alerts. This tendency to avoid or respond negatively to...

6 mins read Read Now
The Role of APM in DevOps and SRE Practices 

The Role of APM in DevOps and SRE Practices 

As the software development world becomes faster, enterprises must adapt to customer demands by increasing their application’s deployment frequency. They often rely on DevOps and Site Reliability Engineering...

7 mins read Read Now
Azure Security Compromised – Hundreds Fell Victim to Phishing

Azure Security Compromised – Hundreds Fell Victim to Phishing

In late November 2023, a phishing campaign successfully compromised hundreds of user accounts, including those...

4 mins read Read Now
Building Your Own Observability Solution vs Implementing a SaaS Solution

Building Your Own Observability Solution vs Implementing a SaaS Solution

Observability is a key component of modern applications, especially highly complex ones with multiple containers,...

7 mins read Read Now
AWS IAM Best Practices

AWS IAM Best Practices

In today’s interconnected digital landscape, robust IAM (Identity and Access Management) practices are critical pillars of an organization’s cybersecurity strategy. IAM serves as the fortress guarding sensitive data,...

8 mins read Read Now