The Official Sysdig Blog

Kubernetes security for Google Cloud Security Command Center

By on May 2, 2018

Effective Kubernetes security hinges on security response teams being able to quickly detect and respond to security threats on live containers – from detection, to remediation, to forensics. With the new Sysdig…

Read More →

Active Kubernetes Security with Sysdig Falco, NATS, and Kubeless

By on May 2, 2018

The composability of Cloud Native platforms has dramatically changed the way we think about the management of these platforms. In this post we’ll talk about how we can leverage this composability to…

Read More →

Falco 0.10.0 Released

By on April 25, 2018

We are happy to announce the release of Falco 0.10.0. This release incorporates a number of improvements focused on making Falco easier to deploy, improvements with rules, and improvements in the system…

Read More →

Kubernetes Security Guide, Chapter 3. Securing Kubernetes components: kubelet, etcd and Docker registry

By on April 24, 2018

In this chapter of the Kubernetes security guide, we are going to cover best practices related to sensitive Kubernetes components and common external resources like the Docker registry. We will learn how…

Read More →

Joining the Sysdig family

By on April 23, 2018

I am deeply honored and excited to become part of the Sysdig family. Leading Nimble Storage from its youngest days through an IPO, and then the acquisition by HPE, has been the…

Read More →

Kubernetes Security Logging with Falco & Fluentd

By on April 4, 2018

Kubernetes security logging primarily focuses on orchestrator events. The Kubernetes documentation provides a good starting point for auditing events of the Kubernetes API. Using Sysdig Falco and Fluentd can provide a more…

Read More →

Kubernetes Security Guide, Chapter 2: Kubernetes Security Context and Kubernetes Network Policy

By on April 4, 2018

Once you have defined Kubernetes users and services credentials and permissions, we start leveraging Kubernetes orchestration capabilities to configure security at the pod level. We will learn how to use Kubernetes Security…

Read More →

Kubernetes Security Guide, Chapter 1: Kubernetes RBAC and TLS certificates

By on April 4, 2018

RBAC security context is a fundamental part of your Kubernetes security best practices, as well as rolling out TLS certificates / PKI authentication for the core Kubernetes API server. We will learn…

Read More →

Kubernetes Security Guide

By on April 4, 2018

In this Kubernetes security guide we want to compile the most significant aspects of implementing Kubernetes security best practices. Kubernetes security, like monitoring or CI/CD is becoming a must as a consequence…

Read More →

5 Changes Containers Bring to PCI Compliance

By on March 28, 2018

Containers have been adopted faster than any previous enterprise technology, and for good reasons. They’re portable, provide robust security through isolation, and allow application teams to develop better services faster. However, the…

Read More →