Sysdig Site Search
CSI Container: Can you DFIR it?
Do you like detective series? Have you ever thought about them actually taking place in cybersecurity? What do you think...
Three multi-tenant isolation boundaries of Kubernetes
Many of the benefits of running Kubernetes come from the efficiencies that you get when you share the cluster –...
What’s new in Sysdig – November 2021
Welcome to a new update of “What’s new in Sysdig.” Happy All Saints’/Souls’ Day! Happy International Pianist Day! Happy Thanksgiving!...
Top 10 Indicators of Compromise in Kubernetes
In this blog, you will learn how monitoring data from your Kubernetes environments can be used to detect indicators of...
Top cloud misconfigurations: A CSPM perspective
Cloud misconfiguration leave the door open for bad actors to exploit your cloud resources. While cloud configuration issues often stem...
As the Need for Real-Time CDR Grows, Sysdig Launches Cloud Identity Insights to Stop Attacks at the First Sign of Compromise
Powered by Falco, Sysdig identifies attacks in motion by correlating identity behavior with workload activity across private, hybrid, and public...
CVSS Version 4.0: What’s New
Over the last decade, many vulnerabilities were initially perceived as critical or high but later deemed less important due to...
Top 15 Kubectl plugins for security engineers in 2025
Kubernetes environments keep getting more complex. Between multi-cloud setups, edge deployments, and a growing list of compliance requirements, keeping your...
Sysdig Adds Unified Threat Detection Across Containers and Cloud to Combat New Lateral Movement
Sysdig introduces continuous CSPM to the Sysdig Secure DevOps Platform, multi-cloud threat detection for AWS and GCP, and a new...
How to detect CVE-2019-14287 using Falco
A recent flaw, CVE-2019-14287, has been found in sudo. In this blogpost, we are going to show you how to...