Sysdig Site Search
Correlating alerts in container environments
Data correlation is perhaps one of the hardest parts of troubleshooting in a complex distributed software environment. It’s relatively easy...
50 shades of system calls
50 Shades of Systems Calls introduces Sysdig and csysdig system call profiling to monitor code performance inside Docker containers with...
Falco Support on AWS Fargate
Today we’re very excited to announce a partnership with Amazon to support Fargate in Sysdig’s product line. We are also...
Why it’s time to rethink vulnerability management
Let’s face it: Vulnerability management (VM) has become a never-ending game of whack-a-mole. Alerts fly in by the thousands. Teams...
Cloud vs. on-prem vulnerability management: Hybrid matters
Vulnerability management requires different approaches in on-prem and cloud environments due to differences in infrastructure, scale, and operational models. As...
Zoom into Kinsing
The Kinsing attack has recently been reported by security researchers, and it is well known for targeting misconfigured cloud native...
Shift Left is Only Part of Secure Software Delivery in Financial Services
Assessing the security of modern cloud applications requires security practices in development as well as production. Learn how financial services organizations can secure their cloud apps across the entire lifecycle.
Architecting Cloud Instrumentation
Architecting cloud instrumentation to secure a complex and diverse enterprise infrastructure is no small feat. Picture this: you have hundreds...
Cloud Security: Turns Out We Needed Another Acronym (CNAPP)
Gartner’s 2023 “Market Guide for Cloud-Native Application Protection Platforms” (CNAPP) caused some security leaders to question whether they need yet...
Auditing container activity – A real example with wget and curl using Sysdig Secure.
One of the first questions Sysdig Secure and Sysdig Falco users have is how do I audit container activity or...