Sysdig Site Search
Refresh yourself on 2024’s top cyber attack trends to stay safe in 2025
We’re officially in the final days of 2024, a year so eventful it feels difficult to remember half of what...
The evolution of vulnerability scanning
As application development and deployment evolve, traditional tools alone can no longer handle the dynamic, ephemeral nature of cloud and...
Introducing Sysdig custom risk insights – strengthen cloud security posture management
Attack surfaces in the cloud are expanding at a breakneck pace. Cloud security has reached an unprecedented level of complexity...
How runtime insights helps with container security
Containers are a key building block for cloud workloads, offering flexibility, scalability, and speed for deploying applications. But as organizations...
Top challenges for implementing multi-domain correlation in the cloud
Adversaries often use complex, multi-stage cloud attacks that evade traditional security measures, which struggle to fully visualize, prioritize, and respond...
On-Prem and Kubernetes: A delicate relationship
In cloud security, context is everything. In the previous two installments of our Customers Care Chronicles, we wrote about how...
5 things I love about Sysdig
Hello there! I’m Sebastian Zumbado, and I’m currently a DevSecOps Engineer in the Sales Engineer business unit at Sysdig. My...
Unmatched coverage for cloud and hybrid workloads: Meet Sysdig’s next generation instrumentation
In today’s rapidly changing and evolving cloud-native environments, security and infrastructure teams face challenges ranging from managing complex deployments to...
CVE-2024-6387 – Shields Up Against RegreSSHion
On July 1st, the Qualys’s security team announced CVE-2024-6387, a remotely exploitable vulnerability in the OpenSSH server. This critical vulnerability...
What’s New in Sysdig – May 2024
“What’s New in Sysdig” is back with the May 2024 edition! My name is Dustin Krysak. I’m a Customer Solutions...