Sysdig Site Search
Understanding and mitigating CVE-2020-8563: vSphere credentials leak in the cloud-controller-manager log
While auditing the Kubernetes source code, I recently discovered an issue (CVE-2020-8563) in Kubernetes that may cause sensitive data leakage....
Get a Dynamically Generated, Container-Native Overview of Your Environment
Introduction A wise man once said, “with great power comes great responsibility.” Here at Sysdig, we take this saying to...
What’s new in Kubernetes 1.13?
Looking forward to the new Kubernetes 1.13 features? At Sysdig we follow Kubernetes development closely and here we bring you...
What’s New in Sysdig – July 2023
“What’s New in Sysdig” is back with the July 2023 edition! My name is Curtis Collicutt, based in Toronto, Canada,...
Sysdig Secure February Release
We’ve been busy at work over the winter adding new functionality to Sysdig Secure and wanted to round up some...
How Sunrun Secures and Monitors applications on Amazon ECS
Implementing run-time Amazon ECS security as well as monitoring tooling for your containerized and microservice based infrastructure are two very...
Guidelines: How to reduce the noise of Falco rules in Sysdig Secure
Rule tuning is one of the most important steps during the definition of the security posture. With the detection rules,...
Sysdig and Cribl: Unleash the true power of cloud security data
Cloud security operates on a different paradigm compared to traditional IT security. For example, it involves multiple contextual layers such...
EMERALDWHALE: 15k Cloud credentials stolen in operation targeting exposed Git config files
The Sysdig Threat Research Team (TRT) recently discovered a global operation, EMERALDWHALE, targeting exposed Git configurations resulting in more than...
Introducing Custom Controls in Sysdig Secure
In the context of cloud security posture management (CSPM), custom controls are policies or rules that give security teams the...