Sysdig Site Search
Sysdig Secure 3.0 introduces native prevention and incident response for Kubernetes
Today, we are excited to announce the launch of Sysdig Secure 3.0! Sysdig Secure is the industry’s first security tool...
Understanding cloud security
Discover how to manage cloud permissions and configurations, detect threats in the cloud, and apply a unified approach for cloud...
Are vulnerability scores misleading you? Understanding CVSS score
Vulnerabilities are everywhere. Vetting, mitigating, and remediating them at scale is exhausting for security practitioners. Let’s keep in mind that...
What’s new in Sysdig – April 2022
Welcome to another iteration of What’s New in Sysdig in 2022! Before starting, once again Happy Easter, Happy Passover, Happy...
Detecting and mitigating Apache Unomi’s CVE-2020-13942 – Remote Code Execution (RCE)
CVE-2020-13942 is a critical vulnerability that affects the Apache open source application Unomi, and allows a remote attacker to execute...
Five things CISOs can do to make containers secure and compliant
Chances are, if you’re not already moving applications to containers and Kubernetes, you’re considering it. However, it’s likely that security...
Sysdig Adds Real-Time Cloud Attack Graph to its Industry-Leading CNAPP
Multidomain correlation identifies imminent risk and surfaces live attack paths in seconds SAN FRANCISCO – Sept. 27, 2023 – Sysdig,...
Five Things CISOs in Financial Services can do to make Containers Secure and Compliant
As competition ramps up in the financial services sector, agile cloud application development is critical to delivering seamless digital experiences customers want. Cloud-native development brings new security and compliance implications. Learn more on what you can do to respond to cloud security risk.
Sysdig 2023 Cloud-Native Security and Usage Report
The sixth annual Sysdig Cloud-Native Security and Usage Report digs into how Sysdig customers of all sizes and industries are...
Breaking down firewalls with BPFDoor (no e!) – How to detect it with Falco
BPF (not eBPF), typically viewed from a defender/sysadmin’s perspective, provides easy access to network packets and the ability to take...