All Topics Cloud Security (47) Compliance (14) Kubernetes & Container Security (45) Monitoring (23) Open Source (0) Sysdig Features (0) Threat Research (0)
Showing 10-18 of 199
Becoming a Cloud Security Ninja: Slice Your SIEM Costs by Pre-Processing Cloud Logs
The cloud threat landscape has evolved with the complex, and dynamic nature of the cloud provider platforms and the multitude of services that are available with the click of a button.
CrashLoopBackoff + Four Other K8s Troubleshooting Tips Everyone Should Know (EMEA)
In this webinar, we will cover some of the common problems that plague every Kubernetes user and show you how to fix them. We will explain why they happen and share some best practices that will make your life easier in the future.
The Ultimate Strategy to Achieve PCI Compliance and Stay That Way on Azure
Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, from source to runtime and maintain proof of compliance.
Becoming a Cloud Security Ninja: Slice Through Alerts and Prioritize What Matters
Join Sysdig, who’s driving the standard for cloud and container security, alongside Tag Cyber, for a discussion around cloud security best practices, tips, and recommendations.
5 Best Practices to Prevent, Detect, and Respond to Threats Lurking Within Your Azure Cloud Workloads
The Cloud-Native landscape is riddled with stories of security breaches and threats. Sysdig Secure extends the open-source Falco engine to protect workloads at runtime.
Becoming a Cloud Security Ninja: Sharpen your Cloud Threat Detection Sword with Machine Learning
Cybercriminals have been developing their skills and attack techniques to expand into cloud and container workloads. How do your security teams defend the cloud infrastructure against an evolving threat landscape?
How to Improve Security for Cloud-Native App Platforms in 3 Easy Steps for Azure
All the cloud providers (including Microsoft Azure) have default controls suggested to secure your infrastructure. We at Sysdig believe in leveraging these and going beyond by following additional steps.
Combat Critical Cloud Vulnerabilities (EMEA)
Cloud and containers are being adopted by a broad set of organizations as they try to maintain a competitive advantage. In our recent Cloud-Native Security and Usage Report, we found that 75% of containers in the cloud have vulnerabilities!