Sysdig Site Search
Hunting malware with Amazon GuardDuty and Sysdig
Read how Amazon GuardDuty Malware Protection works and how Sysdig can utilize these insights inside of Sysdig Secure to provide important security information.
Meet Sysdig at KubeCon North America
Meet Sysdig at KubeCon North America November 6 – 9, 2023 Booth D4 | Chicago, IL Sysdig’s CNAPP, with real-time detection and...
LABRAT: Stealthy Cryptojacking and Proxyjacking Campaign Targeting GitLab
The Sysdig Threat Research Team (TRT) recently discovered a new, financially motivated operation, dubbed LABRAT. This operation set itself apart...
Top metrics for Elasticsearch monitoring with Prometheus
Starting the journey for Elasticsearch monitoring is crucial to get the right visibility and transparency over its behavior. Elasticsearch is...
Why Companies Still Struggle with Least Privilege in the Cloud
Vulnerabilities are only one part of the cloud security story. Misconfigurations are still the biggest player in security incidents and,...
What’s New – December 2023 Recap
Welcome to our December edition of the “What’s New in Sysdig” blog series. We decided to do a year in...
SBOM as a Core Element in Sysdig’s CNAPP Strategy for Enhanced Security
In the fast-paced world of application development, the use of open source components offers a quick path to building sophisticated...
The power of prioritization: Why practitioners need CNAPP with runtime insights
The heightened demand for cloud applications places a premium on the agility of development teams to swiftly create and deploy...
Sysdig Celebrates Falco Graduation Within Cloud Native Computing Foundation
With over 100 million downloads and contributions from companies like IBM, Apple, and Booz Allen Hamilton, Falco is the threat...
Beekeeper Delivers Secure Communications, Data, and Apps Across Cloud Environments
Linux maintainers and vendors disclosed a heap overflow vulnerability in the Linux Kernel causing DoS, escape container or elevate privileges