Sysdig Site Search

Falco vs. AuditD from the HIDS perspective
In this blog, we will compare and contrast Falco vs. AuditD from a Host Intrusion Detection (HIDS) perspective. AuditD is...
What’s new in Sysdig – January 2021
Welcome to another monthly update on what’s new from Sysdig. Our team continues to work hard to bring great new...
Kubernetes monitoring with Prometheus, the ultimate guide
Prometheus monitoring is quickly becoming the Docker and Kubernetes monitoring tool to use. This guide explains how to implement Kubernetes...
What’s new in Sysdig – February 2021
Welcome to another monthly update on what’s new from Sysdig. Our team continues to work hard to bring great new...
Sysdig Adds Unified Threat Detection Across Containers and Cloud to Combat New Lateral Movement
Sysdig introduces continuous CSPM to the Sysdig Secure DevOps Platform, multi-cloud threat detection for AWS and GCP, and a new...
Detect suspicious activity in GCP using audit logs
GCP audit logs are a powerful tool that track everything happening in your cloud infrastructure. By analyzing them, you can...
What’s new in Sysdig – April 2021
Welcome to another monthly update on what’s new from Sysdig. Ramadan Kareem to all observing the holy month of Ramadan....
What’s new in Sysdig – May 2021
Welcome to another monthly update on what’s new from Sysdig. Eid Mubarak! Our team continues to work hard to bring...
What’s new in Sysdig – June 2021
Welcome to another monthly update on what’s new from Sysdig! Happy Pride month! We hope you are celebrating safely, in...
Continuous Security for Google Cloud and Containers
GCP customers use the Sysdig Platform to confidently run containers, Kubernetes, and cloud workloads. With Sysdig, you can secure the build, detect and respond to threats, and continuously validate cloud posture and compliance.