Sysdig Site Search
Getting Started Writing Falco Rules
Sysdig’s Falco is a powerful behavioral activity monitoring tool to detect abnormal behavior in your applications and containers. While it...
How to detect the containers’ escape capabilities with Falco
Attackers use container escape techniques when they manage to control a container so the impact they can cause is much...
Detect malicious activity in Okta logs with Falco and Sysdig okta-analyzer
On March 22, the hacking group Lapsus$ published a Twitter post with a number of screenshots taken from a computer...
8220 Gang Continues to Evolve With Each New Campaign
8220 Gang has been dubbed as a group of low-level script kiddies with an equally disappointing name based on their...
Building on Sysdig’s Open Source Foundation
I want to take this opportunity to say hello! Earlier today, Sysdig announced that I have joined Sysdig, as VP...
Triaging a Malicious Docker Container
Malicious Docker containers are a relatively new form of attack, taking advantage of an exposed Docker API or vulnerable host...
Two months working at Sysdig
After a little more than two months working at Sysdig, I would like to share what led me to choose...
Sysdig Monitor spring 2017 release
We’re really excited to round up all the great functionality we’ve released so far this year on Sysdig Monitor into...
Deploying Sysdig from the new AWS CloudFormation Public Registry
AWS CloudFormation provides an easy way to model and set up AWS resources to help you save time in deploying...
How to detect SSH attempts by Chuck Norris
It’s fun to read about new tools on HackerNews, but I’ve always enjoyed getting my hands dirty and trying something...