Sysdig Site Search
Dynamic DNS & Falco: detecting unexpected network activity
Since the inception of Falco, we’ve seen users write custom rules covering a number of different use cases. Because Falco...
Container Image Scanning on Jenkins with Sysdig
Scanning a container image for vulnerabilities or bad practices on Jenkins using Sysdig Secure is a straightforward process. This article...
Sysdig Secure 2.0 – adds vulnerability management, 200+ compliance checks, and security analytics.
A little over 2 years ago we opensourced Sysdig Falco with the goal of providing a robust detection engine that...
How to Prevent a DDoS Attack
If you want to learn how to prevent a DDoS attack in your cloud environment by detecting the early signs...
PromCat: A resource catalog for enterprise-class Prometheus monitoring
PromCat, short for Prometheus Catalog, is a resource catalog for enterprise-class Prometheus monitoring. Prometheus has been revolutionary in the way...
Inline Image Scanning for AWS CodePipeline and AWS CodeBuild
In this blog post you’ll learn how to set up image vulnerability scanning for AWS CodePipeline and AWS CodeBuild using...
Top 9 file integrity monitoring (FIM) best practices
Discover how applying a quick set of file integrity monitoring best practices will help you detect the tampering of critical...
Software supply chain attacks: why every link matters
To improve our supply chain security, it is necessary to understand the attacks that take place in the supply chain....
From Air Force to Sysdig: A Career in Cybersecurity
Growing up as a small-town science nerd with a goal of solving crimes, never in a million years did I...
Sysdig 2022 Cloud-Native Security and Usage Report: Stay on Top of Risks as You Scale
The fifth annual Sysdig Cloud-Native Security and Usage Report digs into how Sysdig customers of all sizes and industries are...