Sysdig Site Search
What’s New in Sysdig – July 2023
“What’s New in Sysdig” is back with the July 2023 edition! My name is Curtis Collicutt, based in Toronto, Canada,...
Sysdig Secure February Release
We’ve been busy at work over the winter adding new functionality to Sysdig Secure and wanted to round up some...
How Sunrun Secures and Monitors applications on Amazon ECS
Implementing run-time Amazon ECS security as well as monitoring tooling for your containerized and microservice based infrastructure are two very...
Guidelines: How to reduce the noise of Falco rules in Sysdig Secure
Rule tuning is one of the most important steps during the definition of the security posture. With the detection rules,...
Sysdig and Cribl: Unleash the true power of cloud security data
Cloud security operates on a different paradigm compared to traditional IT security. For example, it involves multiple contextual layers such...
EMERALDWHALE: 15k Cloud credentials stolen in operation targeting exposed Git config files
The Sysdig Threat Research Team (TRT) recently discovered a global operation, EMERALDWHALE, targeting exposed Git configurations resulting in more than...
Introducing Custom Controls in Sysdig Secure
In the context of cloud security posture management (CSPM), custom controls are policies or rules that give security teams the...
Introducing Falco Feeds by Sysdig
The cybersecurity landscape is sadly brimming with tools that address narrow, specific problems, leading to a phenomenon known as “Point...
How to securely onboard customers during a cloud security solution migration
For a company running an application in the cloud, replacing their security tool comes with a couple of big concerns....
Leadership Strategies for Risk Reduction, Transparency, and Speed
To respond to the increasing number of federal cybersecurity recommendations and regulations, cybersecurity leaders and their teams need to be...