Sysdig Site Search
5 Best practices for ensuring secure container images
Most modern organizations understand that the earlier you integrate security into the development process, the more secure the applications will...
Detecting jQuery File Upload vulnerability using Falco (CVE-2018-9206)
In the past few days, a new vulnerability was disclosed in a widely used component – jQuery File Upload plugin....
Three multi-tenant isolation boundaries of Kubernetes
Many of the benefits of running Kubernetes come from the efficiencies that you get when you share the cluster –...
A Hacker’s Secrets to Ethically Cracking the Code in Today’s Digital World with Dr. Charlie Miller
Join us for a fireside chat with renowned ‘White Hat’ hacker, Dr. Charlie Miller. He will share details about his own behind-the-scenes journeys and how hackers exploit vulnerabilities and why corporations and governments should address cybersecurity before assets—or lives—are put at risk.
Lower Your Kubernetes Bill By 40%!
Without utilization information for Kubernetes environments, developers are blind to where their cloud resources are over or under-allocated.
The Threat Hunter’s Playbook: Mastering Cloud Defense Strategies
Join our 2023 Cloud Threat Report webinar where we will unravel the enigmatic world of weaponized cloud automation and expose cunning attacker tactics hiding among the clouds.
OWASP Kubernetes Top 10 Projects: What Risks You Need to Prioritize in 2023
Discover the art of prioritizing risks in Kubernetes platforms based on their commonality and probability, as outlined by the OWASP Kubernetes Top 10. Gain invaluable insights into how additional grouping of risks can enhance your security program, adding tremendous value to your defense strategy.
Strengthening Cyberattack Preparedness Through Identity Threat Detection and Response (ITDR)
This webinar delves into how the adaptable plugin architecture of the open-source Falco empowers security responders to expand their system call event detection capabilities to encompass auditing events originating from identity systems like Okta.
New GKE installation for Docker monitoring
Stuff just takes…too…long these days. How long should you wait, for example , to monitor your docker containers on GKE?...
Preventing malicious use of Weave Scope
Intezer and Microsoft reported on Sept. 9 that TeamTNT hackers are deploying Weave Scope in compromised systems as an auxiliary...