background graphic

Sysdig Site Search

Showing 10 of 446

26 AWS Security Best Practices to Adopt in Production


One of the most important pillars of a well-architected framework is security. Thus, it is important to follow these AWS...

AWS Security Groups Guide


AWS Security Groups (and Network ACLs and VPCs) are some of the fundamental building blocks of security in your cloud...



We share 26 AWS security best practices that are indispensable to follow in order to to prevent unnecessary security situations.

AWS’s Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation


The Sysdig Threat Research Team (TRT) has uncovered a novel cloud-native cryptojacking operation which they’ve named AMBERSQUID. This operation leverages...

Improving AWS security services with Sysdig Secure


Learn about AWS security services and how third-party tools like the Falco and Sysdig Secure complement Amazon offerings for complete cloud security.

Monitoring AWS Fargate with Prometheus and Sysdig


In this article, we will show how it’s easily possible to monitor AWS Fargate with Sysdig Monitor. By leveraging existing...

Sysdig achieves AWS DevSecOps specialization within AWS DevOps Competency


Sysdig is pleased to announce that it has achieved Amazon Web Services (AWS) DevOps Competency for development, security, and operations...

Sysdig Boosts AWS Security with the First Automated Inline Scanning for Fargate

press releases

Sysdig also adds threat detection using AWS CloudTrail with open source Falco SAN FRANCISCO – September 29, 2020 — Sysdig,...

AWS CIS: Manage cloud security posture on AWS infrastructure


Implementing the AWS Foundations CIS Benchmarks will help you improve your cloud security posture in your AWS infrastructure. What entry...

AWS threat detection using CloudTrail and Sysdig Secure


Implementing AWS threat detection with Sysdig Secure takes just a few minutes. Discover how to improve the security of your...

1 2 3 45

Stay up to date! Sign up to receive our newsletter.