Sysdig Site Search
Will the Cloud Kill Security Agents?
The “agents or no agents” debate is ancient and eternal. Every decade or so, we go through another round of...
4 Ways to Combat the DevOps and Security Workforce Shortage
Most people are painfully aware that security breaches have increased in recent years, while at the same time becoming much...
Lambda Threat – Best Practices for Lambda Security
Our security research team will explain a real attack scenario from the black box and white box perspective on how...
Cloud Infrastructure Entitlements Management (CIEM) with Sysdig Secure
Discover what CIEM Security is and how easy it is to implement with Sysdig Secure for cloud. Over-permissioned accounts and...
Sending little bobby tables to detention
Little Bobby Tables shows us why it’s a good idea to sanitize your database inputs to avoid SQL injection attacks:...
Announcing Falco 0.3.0
On Friday we released Falco 0.3.0. The biggest change in this release is significantly reduced cpu usage, involving changes in...
A universal Slack event router
It’s no secret that more and more teams nowadays live on Slack. Discussions, internal and external events, application notifications are...
Monitoring AWS Lambda with Prometheus and Sysdig
In this post, we will show how it’s easily possible to monitor AWS Lambda with Sysdig Monitor. By leveraging existing...
Monitoring greedy containers (Part 1)
Many others have written about the challenge of greedy neighbors, especially for virtual machines running in AWS. But now with...
Q&A with Loris Degioanni: On raising $15m and democratizing containers
Cha-ching! Sysdig has put a little more money in the bank. So what’s the story? I decided it would be...