All Cloud Security (49) Compliance (15) Kubernetes & Container Security (31) Monitoring (11) Open Source (9) Sysdig Features (2) Threat Research (10)
Showing 19-27 of 107
Unpacking Supply Chain & Cloud Security Risks
Attend this session to hear how supply chains form in modern designs and why scanning dependencies are more important than ever.
Kubernetes Security: from image creation to container incident response.
Explore Sysdig Webinars and learn how Sysdig is converging security and compliance with DevOps for cloud native production deployments.
Securing Talend’s Cloud Migration
According to Gartner, 99% of all cloud security failures will fall on the customer. Cloud security risks are complex and constantly evolving. That’s why Sysdig works to help organisations such as Talend, a Qlik Company, to protect their cloud native apps and deployments.
Cloud Native Now
At Cloud Native Now we’ll explore the various facets of cloud-native that are essential for a successful digital transformation and enterprise modernization.
Lessons from the Trenches: Maintaining Effective Security in Cloud
ICG Consulting provides cloud hosting and managed security services for their financial back-office solution customers who want to deploy ICG’s applications without the usual headaches of complex cloud infrastructure.
Navigating Cloud and Container Security Risk
We've identified critical insights and best practices, based on real-time data from billions of containers living in multiple clouds, and we’re eager to share them with you.
Shift Cloud Security Left and Right with CNAPP, Powered by Runtime Insights
Learn how to keep your security and DevOps teams shipping more secure applications by shifting security left and shielding right. Understand why real-time cloud detection and response across workloads, cloud services, and identities provides a fundamental CNAPP pillar to stop attacks and prevent breaches.
Shift Cloud Security Left and Right with CNAPP, Powered by Runtime Insights – EMEA
To increase profitability in today’s business landscape, cloud-native applications deploy code on a continuous basis. However, conventional security methods are ill-suited for these environments as they operate independently and lack the ability to exchange information.
Cut Custom Metrics webinar – EMEA
Join us for an insightful discussion where you will learn: Why custom metrics are growing exponentially as well as what cardinality means. Best practices to reduce custom metrics costs. How to consolidate your monitoring tools to remove complexity and scale what you can observe.