background graphic

Sysdig Site Search

Showing 1091-1100 of 1330

How to Detect and Respond to Threats Lurking in your GKE Workloads

webinars

The cloud-native landscape is riddled with stories of security breaches. Do you know what’s happening inside your containers on GKE?

Cloud Defense in Depth: Lessons from the Kinsing Malware

Blog

In the face of persistent data breaches and escalating cyber threats, organizations are compelled to prioritize cloud defense in depth....

Shift Left is Only Part of Secure Software Delivery in Financial Services

Blog

Assessing the security of modern cloud applications requires security practices in development as well as production. Learn how financial services organizations can secure their cloud apps across the entire lifecycle.

How Businesses Can Comply with the EU’s Artificial Intelligence Act

Blog

On March 13, 2024, the European Parliament marked a significant milestone by adopting the Artificial Intelligence Act (AI Act), setting...

Q&A with Alex Polvi, CEO of CoreOS

Blog

We recently sat down with Alex Polvi, CEO of CoreOS, to pick his brain on our favorite topic: containers. Here...

Detecting MITRE ATT&CK: Defense evasion techniques with Falco

Blog

The defense evasion category inside MITRE ATT&CK covers several techniques an attacker can use to avoid getting caught. Familiarizing yourself...

Finding Suspicious Events with AWS CloudTrail: Fundamentals and Best Practices

webinars

You see the headlines, and think, “thank goodness it wasn’t us”. An overly permissive web server exposes 100 million+ consumer credit applications in an S3 bucket, leaving hundreds of millions of user records open to the public.

It’s almost here! April 10 at Tech Field Day we ‘mind the gap.’ Come see our new product announcement.

Blog

Cloud-native visibility gap, we’re coming for you. We are excited to join the Tech Field Day team at Cloud Field...

Five things CISOs can do to make containers secure and compliant

Blog

Chances are, if you’re not already moving applications to containers and Kubernetes, you’re considering it. However, it’s likely that security...

Detect CVE-2020-8555 using Falco

Blog

This CVE is a Server Side Request Forgery (SSRF) vulnerability in kube-controller-manager that allows certain authorized users to leak up...

1 108 109 110 111 112 133

Stay up to date! Sign up to receive our newsletter.