Sysdig Site Search
How to use Atomic Red Team to test Falco rules in K8s
The best way to know if something works is to try it out. Ensuring that your security products are actually...
Exploring Syscall Evasion – Linux Shell Built-ins
This is the first article in a series focusing on syscall evasion as a means to work around detection by...
Falco in the open
One of the most successful aspects of Kubernetes is how functional the open source community was able to operate. Kubernetes...
Challenges using Prometheus at scale
This article will cover the most common challenges you might find when trying to use Prometheus at scale. Prometheus is...
What’s new in Sysdig – September 2020
Welcome to our monthly update on what’s new from Sysdig! This month is a little eclipsed by last month’s big...
5 Best Practices to Prevent, Detect, and Respond to Threats Lurking Within Your Azure Cloud Workloads
The Cloud-Native landscape is riddled with stories of security breaches and threats. Sysdig Secure extends the open-source Falco engine to protect workloads at runtime.
FIND, FOCUS, and FIX the Cloud Threats that Matter Solutions Forum
Join Sysdig, who’s driving the standard for cloud and container security, alongside other industry experts, customers, and partners - for an insightful exchange of cloud security best practices, tips, and recommendations.
Image Scanning on Azure
Do you want to ensure images are free of vulnerabilities and meet best practices before pushing to production? Image scanning refers to the process of analyzing the contents and the build process of a container image in order to detect security issues, vulnerabilities, or bad practices. Participants will learn how Sysdig Secure can identify vulnerabilities pre-production and at runtime.
Sysdig Inspect – a powerful interface for container troubleshooting and security investigation
Sysdig is routinely praised by users for the richness of the data it’s able to capture and for the ability...
Zoom into Kinsing
The Kinsing attack has recently been reported by security researchers, and it is well known for targeting misconfigured cloud native...