Sysdig Site Search
Securing AWS IAM with Sysdig Secure
Last year’s IDC’s Cloud Security Survey found that nearly 80 percent of companies polled have suffered at least one cloud...
Our $188M funding round fuels our mission to help customers confidently run modern cloud applications
Today, I am excited to share that we secured $188M in a new funding round, at a valuation of $1.19B...
Unveil hidden malicious processes with Falco in cloud-native environments
Detecting malicious processes is already complicated in cloud-native environments, as without the proper tools they are black boxes. It becomes...
Getting started with PromQL
Getting started with PromQL can be challenging when you first arrive in the fascinating world of Prometheus, here’s a PromQL...
Secure and monitor your containers on Bottlerocket from AWS
Sysdig is pleased to support AWS today in their GA launch of Bottlerocket, a special-purpose operating system designed for hosting...
Image scanning for CircleCI
In this blog post, we are going to cover how to perform container image scanning for CircleCI using Sysdig Secure....
AWS ECR Scanning with Sysdig Secure
As container adoption in AWS takes off, ECR scanning is the first step towards delivering continuous security and compliance. You...
How to detect CVE-2019-14287 using Falco
A recent flaw, CVE-2019-14287, has been found in sudo. In this blogpost, we are going to show you how to...
Monitoring as a Microservice
Launch day. For an entrepreneur, this is always an exciting day. But this time I’m particularly excited. I’m excited because...
Top 5 features to look for in a cloud detection and response solution
Modern enterprise environments come in a variety of flavors across public and private cloud and on-premises infrastructure. Attackers are keen...