Blog
How to securely onboard customers during a cloud security solution migration
For a company running an application in the cloud, replacing their security tool comes with a couple of big concerns….
Search Results 11 - 22 of 134
Blog
For a company running an application in the cloud, replacing their security tool comes with a couple of big concerns….
Blog
Remember Wireshark from the good old days of your IT degree or early engineering adventures? Well, guess what? It’s still…
Blog
“What’s New in Sysdig” is back with the May 2024 edition! My name is Dustin Krysak. I’m a Customer Solutions…
Blog
In Kubernetes, managing and analyzing network traffic poses unique challenges due to the ephemeral nature of containers and the layered…
Blog
The recent discovery of a backdoor in XZ Utils (CVE-2024-3094), a data compression utility used by a wide array of…
Blog
This is part two in our series on building honeypots with Falco, vcluster, and other assorted open source tools. For…
Blog
Hey there! I’m Devin Limo, a Senior Customer Solutions Architect here at Sysdig. February was a whirlwind, and we’ve got…
Blog
DIE is the notion that an immutable workload should not change during runtime; therefore, any observed change is potentially evident…
Blog
The Sysdig Threat Research Team (TRT) discovered the malicious use of a new network mapping tool called SSH-Snake that was…
Blog
The Sysdig Threat Research Team (TRT) published their latest Cloud-Native Security & Usage Report for 2024. As always, the research…
Blog
This is the first article in a series focusing on syscall evasion as a means to work around detection by…
Brief