EMERALDWHALE: 15,000 creds stolen in operation targeting Git config files
LEARN MORE
Hot off the press: The 2024 Sysdig Global Threat Report is available now!
GET THE REPORT
Sysdig is a Representative Vendor in the 2024 Gartner® Market Guide for CNAPP
GET THE GUIDE
Meet Sysdig Sage: The first conversational AI cloud security analyst of its kind
LEARN MORE
×
Platform
Back
Platform
Platform
Sysdig Secure
CNAPP powered by runtime insights
Environments
Integrations
Powered By
Falco
The core engine providing runtime insights to the Sysdig platform
hidden header
Sysdig Sage™ GenAI
AI cloud security analyst with multi-step reasoning
555 Benchmark
Detect and respond to cloud attacks faster than attackers can complete them
Solutions
Back
Solutions
Real-time Cloud Security
Cloud-Native Application Protection Platform
Unified cloud security to protect your cloud, containers, and workloads
AI Workload Security
Detect, prioritize, and remediate active AI risk
Cloud Detection & Response
Detect, investigate, and respond to threats at cloud speed
From Prevention to Detection & Response
Vulnerability Management
Cloud Security Posture Management
Cloud Identity & Entitlement Management
hidden
Container & Kubernetes Security
Server Threat Detection & Response
Infrastructure as Code Security
Cloud Security Requires Runtime Insights
Real-time visibility for detection and response and rich context to prioritize what matters most
Company
Back
Company
Why Sysdig
Our Customers
Hear how our customers secure and accelerate innovation in the cloud
Runtime Insights
Learn how runtime insights powers real-time cloud security
Threat Research Team
Get the latest threat research and security findings
About Sysdig
Who We Are
Leadership Team
Newsroom
Compare Sysdig
Aqua
Crowdstrike
Lacework
Orca
Prisma Cloud
SentinelOne
Wiz
Customer Spotlight
BigCommerce achieves real-time cloud security
Open Source
Back
Open Source
OSS
Sysdig & OSS
The future of security is open
Projects
Falco
Detect threats in real time
hidden
Open Policy Agent
Unify policy enforcement for cloud-native environments
Prometheus
Monitor cloud-native applications and Kubernetes
Why Open Source Matters
Falco’s journey to CNCF graduation
Resources
Back
Resources
Learn
Blog
Get the latest news and insights from cloud security experts
Learn Cloud Native
Learn cloud and container security fundamentals
Content Library
Explore cloud and container security content
Engage
Webinars & Workshops
Events
Contact Us
Get Support
Contact Support
Sysdig Status
Docs
Sysdig Threat Research
Security research focused on the latest cloud-native security threats, vulnerabilities, and attack patterns
Search
Back
Search for:
Search
Best Match
View all search results
Languages
Back
Language
Language Header – Hidden
Deutsch
English
Español
Français
Italiano
日本
Log In
Back
Log In
Monitor
US-East
US-West
EU-Central
AWS-AP-Sydney
AWS-AP-South
GCP-US-West
Secure
US-East
US-West
EU-Central
AWS-AP-Sydney
AWS-AP-South
GCP-US-West
Log In – 3rd Column Header – HIdden
Support
Get Demo
555 Benchmark
Detect and respond to cloud attacks faster than attackers can complete them
Events
Webinars
Webinars On-Demand
Workshops
Filter by Category
Events
Webinars
Webinars On-Demand
Workshops
Webinars
Upcoming Webinars
SANS FALL CyberFest 2024
Supercharge your cybersecurity expertise! SANS Fall CyberFest is your chance to dive deep into the latest cybersecurity solutions, technologies, and techniques from the industry's top experts and solutions providers.
Nov 6 - 8, 2024
Cloud Security Convergence Report Webcast & Forum: How Control Models for A Robust Cloud Security Stack Are Changing
Don’t miss this opportunity to gain valuable knowledge, connect with thought leaders, and enhance your organization's security posture in an increasingly complex cloud environment.
Dec 6, 2024 10am Pacific | 1pm Eastern
On-Demand Webinars
Filter By:
ON-DEMAND
OWASP Top 10: Control Measures for Kubernetes Security
This hands-on webinar, “OWASP Top 10 Training for Kubernetes,” offers an in-depth exploration of how to implement the OWASP Top 10 security controls effectively within Kubernetes.
ON-DEMAND
AI Hijacked This Webinar
Explore Sysdig Webinars and learn how Sysdig is converging security and compliance with DevOps for cloud native production deployments.
ON-DEMAND
Ghosts in the Machine: Detecting Threats in Your Cloud
Join cybersecurity influencer Graham Cluley to uncover hidden cloud threats, master threat-hunting techniques, and explore chilling real-world security stories. Learn how to banish cyber ghouls and keep your cloud safe from lurking dangers.
ON-DEMAND
From Zero to CK(A)(S) Hero: Insider Tips and K8s Certification Exam Strategies with CNCF Fellow Saiyam Pathak
Saiyam Pathak shares insider tips and K8s certification exam strategies to elevate your skills and drive innovation in your career and organization.
ON-DEMAND
Defend at Cloud Speed: Automating Detection and Response with Sysdig and Google SecOps
Using Sysdig and Google SecOps, discover how to protect your organization against modern threats with real-time detection, full-context investigation, and automated response.
ON-DEMAND
Who Stole My Cloud?
The cloud has become both the engine of progress and a playground for cybercriminals. As your cloud footprint grows, so does the complexity of securing it. Are you prepared for what’s next?
ON-DEMAND
Navigating “Shift-left” in Container Security
Explore Sysdig Webinars and learn how Sysdig is converging security and compliance with DevOps for cloud native production deployments.
ON-DEMAND
Finance & Risk Cyber Security Summit
Learn how financial services organizations can secure cloud-native environments, safeguard workloads, and manage FinServ compliance demands.
ON-DEMAND
When Seconds Count: Real-time Cloud Security with AWS and Sysdig
Join AWS and Sysdig experts for an insightful conversation about cloud security challenges and effective solutions. Explore the latest wave of cloud security strategies that not only consolidate essential protections but also tackle real risks with a fresh perspective.