All Cloud Security (49) Compliance (15) Kubernetes & Container Security (31) Monitoring (11) Open Source (9) Sysdig Features (2) Threat Research (10)
Showing 100-107 of 107
Container and Kubernetes Security Best Practices: Forensics & Incident Response
Conducting forensics and incident response for containers and Kubernetes helps you better understand security breaches, meet compliance requirements and recover quickly. On average, containers live less than 5 minutes, so having a cloud native incident response plan is critical.
Continuous Compliance on AWS
Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks.
Securing Microsoft Azure Cloud and Containers
Join us as we discuss ways to ensure visibility, security, and compliance in a dynamic, constantly changing cloud environment.
Cloud and Container Runtime Security on AWS
Join us to learn how Sysdig Secure extends the open-source Falco runtime security engine, and saves time creating and maintaining runtime policies. Our rules map to MITRE ATT&CK framework, NIST and PCI, along with other container/Kubernetes runtime detection and cloud security threat policies.
Zero Trust Security for OpenShift and Hybrid Cloud
The constant risk of security breaches is driving DevOps and cloud teams to embrace a Zero Trust approach to security. It’s critical to lock down your environment, but at the same time, you don’t want to break existing applications and workflows.
Image Scanning on AWS
Do you want to ensure images are free of vulnerabilities and meet best practices before pushing to production? Participants will learn how Sysdig Secure can identify vulnerabilities pre-production and at runtime.
Secure DevOps Best Practices for Multicloud Environments
Multicloud is inevitable. In fact, it’s likely you’re already using different clouds like AWS, Google Cloud, and Azure for various functions. But, how do you address risk and ensure proper security practices across all of your cloud accounts and deployments?
Scale up Threat Detection, Scale Down False Positives in the Cloud
The cloud vendors offer hundreds of cloud services your team may be using. How can you identify threats across these services without drowning in a sea of alerts? Join us to learn how to scale up threat detection and scale down false positives in the cloud.