Sysdig Site Search
AWS Security Groups Guide
AWS Security Groups (and Network ACLs and VPCs) are some of the fundamental building blocks of security in your cloud...
Cloud DNS Security – How to protect DNS in the Cloud
When using DNS in the Cloud, security cannot be overlooked. This article is for cloud architects and security practitioners who...
Prometheus 2.37 – The first long-term supported release!
Prometheus 2.37 is out and brings exciting news: this is the first long-term supported release. It’ll be supported for at...
How to Secure Amazon EC2 with Sysdig
Elastic Compute Cloud (EC2) is arguably one of the most popular AWS services, and really needs no introduction but here...
Sysdig Announces Risk Spotlight to Prioritize Vulnerabilities Based on Runtime Intelligence
Sysdig Secure reduces vulnerability alerts by 95%, allowing developers to focus on shipping applications faster SAN FRANCISCO — April 20,...
Top key metrics for monitoring MySQL
Monitoring MySQL with Prometheus is easy to do thanks to the MySQL Prometheus Exporter. MySQL doesn’t need an introduction –...
Confidently deliver HIPAA compliance software with Sysdig Secure
HIPAA compliance law, the Health Insurance Portability and Accountability Act in long form, is one of the compliance standards the...
How to monitor Docker Swarm
In the following tutorial I will show how to monitor Docker Swarm using Sysdig Monitor. Docker Swarm is the Docker...
Automated Falco rule tuning
We recently released the automated Falco rule tuning feature in Sysdig Secure. Out-of-the-box security rules are a double-edged sword. On...
Top 5 key metrics for monitoring Amazon RDS
Monitoring Amazon RDS may require some observability strategy changes if you switched from a classic on-prem MySQL/PostgreSQL solution. Amazon RDS...