background graphic

Sysdig Site Search

Showing 1071-1080 of 1340

5 Best practices for ensuring secure container images

Blog

Most modern organizations understand that the earlier you integrate security into the development process, the more secure the applications will...

Detecting jQuery File Upload vulnerability using Falco (CVE-2018-9206)

Blog

In the past few days, a new vulnerability was disclosed in a widely used component –  jQuery File Upload plugin....

Three multi-tenant isolation boundaries of Kubernetes

Blog

Many of the benefits of running Kubernetes come from the efficiencies that you get when you share the cluster –...

A Hacker’s Secrets to Ethically Cracking the Code in Today’s Digital World with Dr. Charlie Miller

webinars

Join us for a fireside chat with renowned ‘White Hat’ hacker, Dr. Charlie Miller. He will share details about his own behind-the-scenes journeys and how hackers exploit vulnerabilities and why corporations and governments should address cybersecurity before assets—or lives—are put at risk.

Lower Your Kubernetes Bill By 40%!

webinars

Without utilization information for Kubernetes environments, developers are blind to where their cloud resources are over or under-allocated.

The Threat Hunter’s Playbook: Mastering Cloud Defense Strategies

webinars

Join our 2023 Cloud Threat Report webinar where we will unravel the enigmatic world of weaponized cloud automation and expose cunning attacker tactics hiding among the clouds.

OWASP Kubernetes Top 10 Projects: What Risks You Need to Prioritize in 2023

webinars

Discover the art of prioritizing risks in Kubernetes platforms based on their commonality and probability, as outlined by the OWASP Kubernetes Top 10. Gain invaluable insights into how additional grouping of risks can enhance your security program, adding tremendous value to your defense strategy.

Strengthening Cyberattack Preparedness Through Identity Threat Detection and Response (ITDR)

webinars

This webinar delves into how the adaptable plugin architecture of the open-source Falco empowers security responders to expand their system call event detection capabilities to encompass auditing events originating from identity systems like Okta.

New GKE installation for Docker monitoring

Blog

Stuff just takes…too…long these days. How long should you wait, for example , to monitor your docker containers on GKE?...

Preventing malicious use of Weave Scope

Blog

Intezer and Microsoft reported on Sept. 9 that TeamTNT hackers are deploying Weave Scope in compromised systems as an auxiliary...

1 106 107 108 109 110 134

Stay up to date! Sign up to receive our newsletter.