background graphic

Sysdig Site Search

Showing 10 of 474

Falco

page

Detect threats and anomalous activity across containers, hosts, Kubernetes and cloud with Falco open source security.

Open Source

page

Detect threats and anomalous activity across containers, hosts, Kubernetes and cloud with Falco open source security.

Getting started with runtime security and Falco

Blog

Discover how to get started with Falco to overcome the challenges of implementing runtime security for cloud-native workloads. If you...

Falco vs. AuditD from the HIDS perspective

Blog

In this blog, we will compare and contrast Falco vs. AuditD from a Host Intrusion Detection (HIDS) perspective. AuditD is...

Comparing GuardDuty & Falco on EKS

Blog

Read about the differences between Amazon GuardDuty and Falco for Amazon EKS to better understand what each tool does, the threats detected, and the metadata available for forensic analysis.

Detecting MITRE ATT&CK: Privilege escalation with Falco

Blog

The privilege escalation category inside MITRE ATT&CK covers quite a few techniques an adversary can use to escalate privileges inside...

ChatGPT as your Falco Consultant

Blog

Can OpenAI ChatGPT become a contributor for an open source project like Falco? Is this the end of GitHub Copilot?...

How to detect TOR network connections with Falco

Blog

TOR was created with the idea of anonymizing connections across the Internet, but as in other instances, this can be...

GKE security using Falco, Pub/Sub, and Cloud Functions

Blog

In this blogpost we will demonstrate how to build a complete GKE security stack for anomaly detection and to prevent...

Falco is the First Runtime Security Project to join CNCF Incubation

press releases

Falco, originally created by Sysdig in 2016, is approved to join the CNCF Incubator after a 257 percent increase in...

1 2 3 48

Stay up to date! Sign up to receive our newsletter.