background graphic

Sysdig Site Search

Showing 721-730 of 940

PromCon Online 2021 highlights

Blog

What an exciting month, with PromCon Online 2021 and KubeCon EU 2021! These presentations were full of feature announcements, live...

Threat news: Tsunami malware mutated. Now targeting Jenkins and Weblogic services

Blog

The Tsunami malware is back! Although it appeared for the first time several years ago, the Sysdig Research Team has...

CVE-2022-0847: “Dirty Pipe” Linux Local Privilege Escalation

Blog

Right on the heels of CVE-2022-4092, another local privilege escalation flaw in the Linux Kernel was disclosed on Monday, nicknamed...

SBOM 101

Blog

During many recent security incidents, we hear a lot of messages about the lack of knowledge of the code dependencies,...

NIST 800-190 Application Security Guide Checklist

guides

Read the NIST Application Security Guide where we show you how to go a step beyond the recommendations from the NIST SP 800-190 application container security publication. This is a checklist of the practical steps and controls you can take to comply with NIST recommendations using Sysdig.

Exploiting, Mitigating, and Detecting CVE-2021-44228: Log4j Remote Code Execution (RCE)

Blog

A new critical vulnerability has been found in log4j, a widely-used open-source utility used to generate logs inside java applications....

5 Keys to Securing AWS Cloud and Containers

briefs

How can you automate efficient security and compliance controls in your Amazon Web Services (AWS) environment? Secure and accelerate your cloud innovation on AWS with five key workflows for cloud and container security.

Shifting Security Further Left with IaC Security

webinars

Modern DevOps teams are adopting GitOps principles: provisioning workloads using infrastructure-as-code (IaC) tools and managing policies as code using open source tools like Open Policy Agent (OPA)

Become a Certified K8s Security Specialist (CKS) in 2022! How to Pass with Saiyam Pathak, CNCF Ambassador

webinars

Join Sysdig and CNCF Ambassador Saiyam Pathak as we discuss key security concepts and tools, complemented with hands-on demo scenarios that will help you prepare for the CKS exam.

Continuous Compliance on Azure 

webinars

Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks. 

1 71 72 73 74 75 94

Stay up to date! Sign up to receive our newsletter.