Sysdig Site Search
How to Detect SCARLETEEL with Sysdig Secure
The recent SCARLETEEL incident highlights the importance of detecting security threats early in the development cycle. With Terraform state files,...
KubeCon EU 2022 – Trends & Highlights
Kubecon EU returned to Spain. This time to Valencia, city of paella and horchata and, of course, a great place...
THREAT ALERT: Crypto miner attack – Sysrv-Hello Botnet targeting WordPress pods
The Sysdig Security Research team has identified a Cryptominer attack hitting a Kubernetes pod running WordPress, related to the recent...
K3s + Sysdig: Deploying and securing your cluster… in less than 8 minutes!
As Kubernetes is eating the world, discover an alternative certified Kubernetes offering called K3s, made by the wizards at Rancher....
Sysdig Monitor winter 2017-18 release
We’ve been busy since our fall Sysdig Monitor release. A lot of great features have been rolled out and our...
CVE-2022-0492: Privilege escalation vulnerability causing container escape
Linux maintainers disclosed a privilege escalation vulnerability in the Linux Kernel. The vulnerability has been issued a Common Vulnerability and...
Cybersecurity Strategy Must Include Both Shift-Left and Shield-Right Approaches
Cyber attacks are an unfortunate reality in our interconnected world. The art of keeping up with malicious actors is challenging, but even more so with the move to cloud-native technologies. As a result, security is evolving. Developers, DevOps, and cloud teams must now learn a new set of best practices that balance shift-left security and shield-right security approaches to reduce risk. This white paper developed in collaboration with our partner, Snyk, the leader in developer security, describe the underpinnings of modern cybersecurity programs in the world of containers, Kubernetes, and cloud.
Prometheus metrics / OpenMetrics code instrumentation.
In the following example-driven tutorial we will learn how to use Prometheus metrics / OpenMetrics to instrument your code whether...
The Container Ecosystem Project
The ecosystem of awesome new technologies emerging around containers and microservices can be a little overwhelming, to say the least....
Sysdig and Cribl: Unleash the true power of cloud security data
Cloud security operates on a different paradigm compared to traditional IT security. For example, it involves multiple contextual layers such...