Sysdig Site Search
How to Detect and Respond to Threats Lurking in your GKE Workloads
The cloud-native landscape is riddled with stories of security breaches. Do you know what’s happening inside your containers on GKE?
Cloud Defense in Depth: Lessons from the Kinsing Malware
In the face of persistent data breaches and escalating cyber threats, organizations are compelled to prioritize cloud defense in depth....
Shift Left is Only Part of Secure Software Delivery in Financial Services
Assessing the security of modern cloud applications requires security practices in development as well as production. Learn how financial services organizations can secure their cloud apps across the entire lifecycle.
How Businesses Can Comply with the EU’s Artificial Intelligence Act
On March 13, 2024, the European Parliament marked a significant milestone by adopting the Artificial Intelligence Act (AI Act), setting...
Q&A with Alex Polvi, CEO of CoreOS
We recently sat down with Alex Polvi, CEO of CoreOS, to pick his brain on our favorite topic: containers. Here...
Detecting MITRE ATT&CK: Defense evasion techniques with Falco
The defense evasion category inside MITRE ATT&CK covers several techniques an attacker can use to avoid getting caught. Familiarizing yourself...
Finding Suspicious Events with AWS CloudTrail: Fundamentals and Best Practices
You see the headlines, and think, “thank goodness it wasn’t us”. An overly permissive web server exposes 100 million+ consumer credit applications in an S3 bucket, leaving hundreds of millions of user records open to the public.
It’s almost here! April 10 at Tech Field Day we ‘mind the gap.’ Come see our new product announcement.
Cloud-native visibility gap, we’re coming for you. We are excited to join the Tech Field Day team at Cloud Field...
Five things CISOs can do to make containers secure and compliant
Chances are, if you’re not already moving applications to containers and Kubernetes, you’re considering it. However, it’s likely that security...
Detect CVE-2020-8555 using Falco
This CVE is a Server Side Request Forgery (SSRF) vulnerability in kube-controller-manager that allows certain authorized users to leak up...