Blog
Comparing GuardDuty & Falco on EKS
Read about the differences between Amazon GuardDuty and Falco for Amazon EKS to better understand what each tool does, the threats detected, and the metadata available for forensic analysis.
Search Results 101 - 112 of 394
Blog
Read about the differences between Amazon GuardDuty and Falco for Amazon EKS to better understand what each tool does, the threats detected, and the metadata available for forensic analysis.
Blog
The Sysdig Threat Research Team (TRT) recently discovered threat actors leveraging an open source tool called PRoot to expand the…
Blog
07:00: Starting the day I open my laptop and look over my cases while I slurp down my first cup…
Blog
The conflict between Russia and Ukraine includes a cyberwarfare component with government-supported threat actors and civilian hacktivists taking sides. The…
Blog
Cloud Security Posture Management (CSPM) aims to automate the identification and remediation of risks across your entire cloud infrastructure. A…
Blog
Cryptomining attacks are becoming more notable in-line with the rise of blockchain and cryptocurrencies, so detecting cryptomining has become a…
Blog
When working with containers in Kubernetes, it’s important to know what are the resources involved and how they are needed….
Case Study
SAP Concur delivers secure, compliant solutions to more than 50M end users globally
Blog
Helm is being used broadly to deploy Kubernetes applications as it is an easy way to publish and consume them…
Blog
Keeping up with workload vulnerabilities and cyber threats is huge challenge every day for security teams – especially those deploying…
Whitepaper
Cyber attacks are an unfortunate reality in our interconnected world. The art of keeping up with malicious actors is challenging, but even more so with the move to cloud-native technologies. As a result, security is evolving. Developers, DevOps, and cloud teams must now learn a new set of best practices that balance shift-left security and shield-right security approaches to reduce risk. This white paper developed in collaboration with our partner, Snyk, the leader in developer security, describe the underpinnings of modern cybersecurity programs in the world of containers, Kubernetes, and cloud.
Blog
Many of the benefits of running Kubernetes come from the efficiencies that you get when you share the cluster –…