All Cloud Security (45) Compliance (14) Kubernetes & Container Security (25) Monitoring (11) Open Source (9) Sysdig Features (2) Threat Research (10)
Showing 91-99 of 103
Image Scanning on Azure
Do you want to ensure images are free of vulnerabilities and meet best practices before pushing to production? Image scanning refers to the process of analyzing the contents and the build process of a container image in order to detect security issues, vulnerabilities, or bad practices. Participants will learn how Sysdig Secure can identify vulnerabilities pre-production and at runtime.
Combat Critical Cloud Vulnerabilities
Cloud and containers are being adopted by a broad set of organizations as they try to maintain a competitive advantage. In our recent Cloud-Native Security and Usage Report, we found that 75% of containers in the cloud have vulnerabilities!
Securing Serverless Containers on AWS Fargate
Join us to hear how Sysdig uniquely solves the serverless visibility challenge so you can confidently secure AWS Fargate serverless containers at scale.
Modernize and Secure DevOps with Confidence
Join AWS & Sysdig as we unpack and offer answers about where you can focus your efforts to modernize DevOps and provide key business benefits, such as speed, agility, and cost savings.
Align Your Cloud Security Plan with the Cybersecurity Exec Order
Global security breaches and the White House Executive Order (EO) have sped up the timeline to modernize cybersecurity for both the public and private sectors. The way applications are developed and deployed (in the cloud and on containers), means taking a look at cloud security, Zero Trust architectures, and regulatory compliance in order to meet the mandates, keep moving ahead of the hackers and reduce risk.
Container and Kubernetes Security Best Practices: Forensics & Incident Response
Conducting forensics and incident response for containers and Kubernetes helps you better understand security breaches, meet compliance requirements and recover quickly. On average, containers live less than 5 minutes, so having a cloud native incident response plan is critical.
Continuous Compliance on AWS
Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks.
Securing Microsoft Azure Cloud and Containers
Join us as we discuss ways to ensure visibility, security, and compliance in a dynamic, constantly changing cloud environment.
Cloud and Container Runtime Security on AWS
Join us to learn how Sysdig Secure extends the open-source Falco runtime security engine, and saves time creating and maintaining runtime policies. Our rules map to MITRE ATT&CK framework, NIST and PCI, along with other container/Kubernetes runtime detection and cloud security threat policies.