Sysdig Site Search
Four features of containers that help (and hurt) Docker security
Although most companies make the switch to containers for reasons other than security, eventually they will wonder about exactly how...
Improving the Prometheus exporter for Amazon CloudWatch
A Prometheus CloudWatch exporter is a key element for anyone wanting to monitor AWS CloudWatch. Exporting CloudWatch metrics to a...
Challenges using Prometheus at scale
This article will cover the most common challenges you might find when trying to use Prometheus at scale. Prometheus is...
Detecting and mitigating CVE-2024-12084: rsync remote code execution
On Tuesday, January 14, 2025, a set of vulnerabilities were announced that affect the “rsync” utility. rsync allows files and...
Do not Sell or Share My Personal Information
Examining security benefits and challenges containers bring to software deve by looking at 4 features of containers that help (and hurt) docker security
Navigating the Future: Key EU Cybersecurity Regulatory Frameworks for 2024-2029
The European Union (EU) is leading the development of comprehensive cybersecurity regulations. These frameworks shape secure digital environments and protect...
Cloud DNS Security – How to protect DNS in the Cloud
When using DNS in the Cloud, security cannot be overlooked. This article is for cloud architects and security practitioners who...
Integrations
Examining security benefits and challenges containers bring to software deve by looking at 4 features of containers that help (and hurt) docker security
How to monitor Redis with Prometheus
Redis is a simple – but very well optimized – key-value open source database that is widely used in cloud-native...
Monitoring Ceph with Prometheus
Monitoring Ceph with Prometheus is straightforward since Ceph already exposes an endpoint with all of its metrics for Prometheus. This...