Posts

Search Results 51 - 62 of 134

Blog

How to Prevent a DDoS Attack

If you want to learn how to prevent a DDoS attack in your cloud environment by detecting the early signs…

Blog

CVE-2023-0210

Author: Hrvoje Mišetić KSMBD, as defined by the kernel documentation1, is a linux kernel server which implements SMB3 protocol in…

On-Demand Webinar

Detect Container Security Threats

Looking to use open source tools to prepare, detect and respond to security threats in containers and Kubernetes? Wondering how you can create perimeters in the cloud?

Blog

Comparing GuardDuty & Falco on EKS

Read about the differences between Amazon GuardDuty and Falco for Amazon EKS to better understand what each tool does, the threats detected, and the metadata available for forensic analysis.

Blog

Extortion in Cloud Storage

Extortion can simply be defined as “the practice of obtaining benefit through coercion.“ Data and cloud extortion schemes occur when…

On-Demand Webinar

Cloud and Container Runtime Security on AWS

Join us to learn how Sysdig Secure extends the open-source Falco runtime security engine, and saves time creating and maintaining runtime policies. Our rules map to MITRE ATT&CK framework, NIST and PCI, along with other container/Kubernetes runtime detection and cloud security threat policies.