Blog
Falco vs. AuditD from the HIDS perspective
In this blog, we will compare and contrast Falco vs. AuditD from a Host Intrusion Detection (HIDS) perspective. AuditD is…
Search Results 1 - 10 of 615
Blog
In this blog, we will compare and contrast Falco vs. AuditD from a Host Intrusion Detection (HIDS) perspective. AuditD is…
On-Demand Webinar
As containers and Kubernetes are adopted in production, security is a critical concern and DevOps teams need to go beyond image scanning. Use cases such as runtime security, network visibility and segmentation, incident response and compliance become priorities as your Kubernetes security framework matures. In this talk, we’ll share an overview of runtime security, discuss approaches used by open source and commercial tools. and hear how users are getting started quickly without impacting developer productivity.
Guide
This guide highlights key considerations for security and monitoring on Azure container services. It includes details about available Azure security protections as well as how Sysdig augments and adds specific capabilities that will help you ship applications faster and reduce risk by embedding security, compliance, and monitoring into your DevOps workflow.
Blog
The fourth annual Sysdig Container Security and Usage Report looks at how global Sysdig customers of all sizes and industries…
Report
For the past four years, we’ve provided insights into container usage through real-time, real-world customer data. In this report, you will find further detail about security, compliance, services, alerting, and Kubernetes usage patterns. This information can be useful for determining the real-world state of security and usage for container environments at companies around the world, from a broad range of industries.
Infographic
In 2020, we saw an acceleration of cloud adoption that led to an increase in container usage. This increase, combined with the fact that half of containers live less than five minutes, reinforces the need to manage container-specific security risks. Our goal is to shed light on the current state of container infrastructure, applications, security, and compliance practices.
Blog
Today, Red Hat announced its intent to acquire Stackrox. This is a very exciting development in the world of cloud-native…
Case Study
Learn how Worldpay by FIS was able to reduce operational overhead by 50%, gain efficiency for troubleshooting and forensics, reduce risk, and ensure compliance.
Blog
Most modern organizations understand that the earlier you integrate security into the development process, the more secure the applications will…
Blog
CVE-2020-8554 is a vulnerability that particularly affects multi-tenant Kubernetes clusters. If a potential attacker can create or edit services and…