Sysdig Site Search
5 ways AI improves cloud detection and response
As cloud attacks grow in speed, volume, and impact, cybersecurity teams are turning to AI to enhance cloud detection and...
Cloud invaders: Spotting compromised users before it’s too late
Identities have become one of the most common ways modern threat actors gain a foothold in the cloud. From stolen...
Healthcare IT Provider Cuts Alerts by 99.8%, Reduces Vulnerability Noise by 98%
Healthcare IT Provider boosts compliance automation by 75%, detects threats in real time & reduces audit prep by 80%
Better container monitoring with the number panel
A little secret: Container Monitoring loves numbers …and we love them even more now that we’ve introduced number panels for...
CVE-2024-6387 – Shields Up Against RegreSSHion
On July 1st, the Qualys’s security team announced CVE-2024-6387, a remotely exploitable vulnerability in the OpenSSH server. This critical vulnerability...
Kubernetes 1.27 – What’s new?
Kubernetes 1.27 is about to be released, and it comes packed with novelties! Where do we begin? This release brings...
How global conflicts influenced cyber attack behaviors
The conflict between Russia and Ukraine includes a cyberwarfare component with government-supported threat actors and civilian hacktivists taking sides. The...
CSPM – Least privilege principle in practice
Cloud Security Posture Management (CSPM) aims to automate the identification and remediation of risks across your entire cloud infrastructure. A...
Top 5 key metrics for monitoring Amazon RDS
Monitoring Amazon RDS may require some observability strategy changes if you switched from a classic on-prem MySQL/PostgreSQL solution. Amazon RDS...
Proxyjacking has Entered the Chat
Did you know that you can effortlessly make a small passive income by simply letting an application run on your...