Sysdig Site Search
Building Honeypots with vcluster and Falco: Episode II
This is part two in our series on building honeypots with Falco, vcluster, and other assorted open source tools. For...
12 Container image scanning best practices to adopt in production
Don’t miss out on these 12 image scanning best practices, whether you are starting to run containers and Kubernetes in...
What’s New – March 2024
“What’s New in Sysdig” is back with the March 2024 edition! My name is Jonathon Cerda, based in Dallas, Texas,...
Sysdig Annual Threat Report Highlights Growing Cost and Scale of Cloud Attacks
With a new focus on stealing cloud credentials and exploiting enterprise AI to the tune of $100,000+ per day, the...
Sysdig 2024 Global Threat Report
We know that cloud attacks happen very quickly. Our 2024 global threat year-in-review, the third annual threat report from the...
Refresh yourself on 2024’s top cyber attack trends to stay safe in 2025
We’re officially in the final days of 2024, a year so eventful it feels difficult to remember half of what...
Bedrock Slip: Sysdig TRT Discovers CloudTrail Logging Missteps
While working on Amazon Bedrock APIs and developing detection mechanisms for Sysdig customers, the Sysdig Threat Research Team (TRT) discovered...
Cloud Threats Deploying Crypto CDN
The Sysdig Threat Research Team (TRT) discovered a malicious campaign using the blockchain-based Meson service to reap rewards ahead of...
2024 Gartner® CNAPP Market Guide: Runtime insights is a core pillar of cloud-native application protection platforms
As organizations continue to look for consolidated platforms to address their security needs, an important shift has happened. Customers have...