Sysdig Site Search
Sysdig 2022 Threat Report: Cloud-native threats are increasing and maturing
The first annual cloud-native threat report from Sysdig explores some of the year’s most important security topics in the cloud....
Cryptominer detection: a Machine Learning approach
Cryptominers are one of the main cloud threats today. Miner attacks are low risk, low effort, and high reward for...
Automox Cuts False Positives by 80% and Boosts Vulnerability Response Speed by 30%
Automox uses Sysdig to enhance cloud security, cut false positives by 80%, and streamline IT operations.
NTT DOCOMO Relies on Sysdig to Secure 80+ Million Users
NTT DOCOMO secured GKE with Sysdig, boosting compliance and response times across infrastructure serving 80M+.
Understand AI Threats with MITRE ATLAS
Recently, Sysdig published a blog post about the ways businesses can harden their LLM-based AI applications using the OWASP Top...
The evolution of cloud security: Lessons from the past to navigate the future
Remember asking your teachers when you would need to know history facts outside of school? They probably said that learning...
CVE-2024-6387 – Shields Up Against RegreSSHion
On July 1st, the Qualys’s security team announced CVE-2024-6387, a remotely exploitable vulnerability in the OpenSSH server. This critical vulnerability...
Accelerating AppSec with Mend.io and Sysdig
Sysdig and Mend.io help developers, DevOps, and security teams accelerate secure software delivery from development to deployment.
The Sysdig Cloud Attack Graph – Accelerating Cloud Native Application Protection Platform (CNAPP)
The Rapidly Evolving Cloud Attack Attackers are increasing their focus on the growing cloud playing field as it becomes more...
Ensuring Compliance in an Ever-Evolving Cloud Security Landscape
According to CSO the fines incurred for data breaches or non-compliance with security and privacy laws, for only a handful...