Sysdig Site Search
Sysdig Sage™: A groundbreaking AI security analyst
Generative AI (GenAI) is a top priority for organizations looking to increase productivity and solve business problems faster. In cloud...
How to Deal with Hundreds of Fixes? Choosing the Right Vulnerability Management Solution
Relying solely on the Common Vulnerability Scoring System (CVSS) is insufficient when it comes to effective vulnerability management. While the...
Top metrics for Elasticsearch monitoring with Prometheus
Starting the journey for Elasticsearch monitoring is crucial to get the right visibility and transparency over its behavior. Elasticsearch is...
Falco 0.10.0 released.
We are happy to announce the release of Falco 0.10.0. This release incorporates a number of improvements focused on making...
Why Companies Still Struggle with Least Privilege in the Cloud
Vulnerabilities are only one part of the cloud security story. Misconfigurations are still the biggest player in security incidents and,...
End to End Vulnerability Scanning with Sysdig Secure
Scanning for vulnerabilities is a best practice and a must-have step in your application lifecycle to prevent security attacks. Implementing...
How global conflicts influenced cyber attack behaviors
The conflict between Russia and Ukraine includes a cyberwarfare component with government-supported threat actors and civilian hacktivists taking sides. The...
AWS recognizes Sysdig as an Amazon Linux 2023 Service Ready Partner
Read about Amazon Linux 2023 and the recognition of Sysdig security and monitoring by AWS as a part of the Amazon Web Services (AWS) Service Ready Program.
Prioritize Alerts and Findings with Sysdig Secure
If you work in Security or Operations, you are surely familiar with the concept of “alert fatigue.” Alert fatigue Syndrome...
How to detect TOR network connections with Falco
TOR was created with the idea of anonymizing connections across the Internet, but as in other instances, this can be...