background graphic

Sysdig Site Search

Showing 71-80 of 96

Strengthen LLMs with Sysdig Secure 

Blog

The term LLMjacking refers to attackers using stolen cloud credentials to gain unauthorized access to cloud-based large language models (LLMs),...

Breaking down firewalls with BPFDoor (no e!) – How to detect it with Falco

Blog

BPF (not eBPF), typically viewed from a defender/sysadmin’s perspective, provides easy access to network packets and the ability to take...

Threat news: TeamTNT targeting misconfigured kubelet

Blog

TeamTNT is a prevalent threat actor who has been targeting cloud and virtual environments such as Kubernetes and Docker since...

Why you need to augment prevention-only posture with cloud detection and response

Blog

In the early days of cloud security, like in the early days of endpoint, the focus was on prevention. This...

Sysdig 2023 Cloud-Native Security and Usage Report

Blog

The sixth annual Sysdig Cloud-Native Security and Usage Report digs into how Sysdig customers of all sizes and industries are...

Detecting and Mitigating Remote Code Execution Exploits in CUPS

Blog

What happened? On September 26th, 2024, details were released about several vulnerabilities in the Common Unix Printing System (CUPS) package....

Identity is the Perimeter of the Cloud

Blog

Crystal Morin is Cybersecurity Strategist at Sysdig. Steve Riley is Vice President and Field CTO at Netskope. 93% of last...

Getting started with runtime security and Falco

Blog

Discover how to get started with Falco to overcome the challenges of implementing runtime security for cloud-native workloads. If you...

Detecting suspicious activity on AWS using cloud logs

Blog

AWS offers a large spectrum of services and compute. The “shared responsibility” model in cloud presents a simplified structure of...

Sysdig Identifies a Cloud-Native Security Crossroads: Best Practices vs. Convenience and Speed

Blog

Sysdig’s seventh annual Cloud-Native Security and Usage Report identifies how customers are developing, using, and securing cloud-native applications and environments....

1 6 7 8 9 10

Stay up to date! Sign up to receive our newsletter.