Sysdig Site Search
Introducing Sysdig and Torq – amplify SOC efficiency via automated cloud detection and response
Attackers born in the cloud Cloud attackers are swift and sophisticated, requiring robust threat detection and response programs that can...
Integrating Prometheus alerts and events with Sysdig Monitor
Prometheus alerts: Sysdig ♥ Prometheus (part II) If you already use (or plan to use) Prometheus alerts and events for...
Image Scanning with GitHub Actions
Scanning a container image for vulnerabilities or bad practices on your GitHub Actions using Sysdig Secure is a straightforward process....
Dynamic DNS & Falco: detecting unexpected network activity
Since the inception of Falco, we’ve seen users write custom rules covering a number of different use cases. Because Falco...
Container Image Scanning on Jenkins with Sysdig
Scanning a container image for vulnerabilities or bad practices on Jenkins using Sysdig Secure is a straightforward process. This article...
Sysdig Secure 2.0 – adds vulnerability management, 200+ compliance checks, and security analytics.
A little over 2 years ago we opensourced Sysdig Falco with the goal of providing a robust detection engine that...
How to Prevent a DDoS Attack
If you want to learn how to prevent a DDoS attack in your cloud environment by detecting the early signs...
PromCat: A resource catalog for enterprise-class Prometheus monitoring
PromCat, short for Prometheus Catalog, is a resource catalog for enterprise-class Prometheus monitoring. Prometheus has been revolutionary in the way...
Inline Image Scanning for AWS CodePipeline and AWS CodeBuild
In this blog post you’ll learn how to set up image vulnerability scanning for AWS CodePipeline and AWS CodeBuild using...
Top 9 file integrity monitoring (FIM) best practices
Discover how applying a quick set of file integrity monitoring best practices will help you detect the tampering of critical...