February 10, 2021
Runtime security in Azure Kubernetes Service
Runtime security for Azure Kubernetes Service (AKS) environments requires putting controls in place to detect unexpected and malicious behavior across…
NEW!! See Sysdig at Microsoft Ignite, March 2-4
Search Results 21 - 30 of 432
February 10, 2021
Runtime security for Azure Kubernetes Service (AKS) environments requires putting controls in place to detect unexpected and malicious behavior across…
February 9, 2021
As Kubernetes adoption continues to grow, Kubernetes audit logs are a critical information source to incorporate in your Kubernetes security…
February 4, 2021
In this article, we will explain how to monitor AWS SQS with Prometheus. To monitor AWS SQS, we will leverage…
February 2, 2021
The defense evasion category inside MITRE ATT&CK covers several techniques an attacker can use to avoid getting caught. Familiarizing yourself…
January 28, 2021
A recent privilege escalation heap overflow vulnerability (CVSS 7.8), CVE-2021-3156, has been found in sudo. sudo is a powerful utility…
January 27, 2021
The Sysdig Security Research team has identified crypto mining activities coming from the server hosting the popular RinBot Discord bot….
January 26, 2021
Welcome to another monthly update on what’s new from Sysdig. Our team continues to work hard to bring great new…
January 19, 2021
In this blog, we will compare and contrast Falco vs. AuditD from a Host Intrusion Detection (HIDS) perspective. AuditD is…
January 13, 2021
The fourth annual Sysdig Container Security and Usage Report looks at how global Sysdig customers of all sizes and industries…
January 7, 2021
Today, Red Hat announced its intent to acquire Stackrox. This is a very exciting development in the world of cloud-native…