Sysdig Site Search
Sysdig Achieves AWS Outposts Ready Designation
Sysdig allows organizations to embed security and monitoring into a secure DevOps workflow across hybrid cloud environments SAN FRANCISCO –...
Hunting AWS RDS security events with Sysdig
The AWS RDS service itself falls on the AWS side of the Shared Responsibility model, but the day-to-day management of...
Sysdig Joins New AWS Marketplace for Containers and Achieves Amazon Web Services Container Competency Status.
Sysdig solutions help enterprises monitor and secure cloud-native applications. November 27, 2018.
Inline Image Scanning for AWS CodePipeline and AWS CodeBuild
In this blog post you’ll learn how to set up image vulnerability scanning for AWS CodePipeline and AWS CodeBuild using...
26 AWS security best practices to adopt in production
Security is a fundamental pillar of the AWS Foundational Security Best Practices. To minimize security risks and protect your environment,...
SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft
The Sysdig Threat Research Team recently discovered a sophisticated cloud operation in a customer environment, dubbed SCARLETEEL, that resulted in...
Monitoring AWS Lambda with Prometheus and Sysdig
In this post, we will show how it’s easily possible to monitor AWS Lambda with Sysdig Monitor. By leveraging existing...
Announcing AWS Lambda Telemetry API Support for Sysdig Monitor
The Sysdig Monitor Extension for AWS Lambda Telemetry API is now available to aid observability in serverless computing environments.
Exploiting IAM security misconfigurations
These three IAM security misconfigurations scenarios are rather common. Discover how they can be exploited, but also, how easy it...
Fuzzing and Bypassing the AWS WAF
The Sysdig Threat Research Team discovered techniques that allowed the AWS WAF to be bypassed using a specialized DOM event....