Sysdig Site Search
Architecting Cloud Instrumentation
Architecting cloud instrumentation to secure a complex and diverse enterprise infrastructure is no small feat. Picture this: you have hundreds...
Spotting Vulnerabilities at Rest and at Runtime
According to Gartner, 99% of all cloud security failures will fall on the customer. Cloud security risks are complex and constantly evolving. That’s why Sysdig works to help organisations such as Talend, a Qlik Company, to protect their cloud native apps and deployments.
Kubernetes Security: from image creation to container incident response.
How do you architect cloud instrumentation? Securing a complex and diverse environment like an enterprise cloud infrastructure is not easy.
Cloud Security: Turns Out We Needed Another Acronym (CNAPP)
Gartner’s 2023 “Market Guide for Cloud-Native Application Protection Platforms” (CNAPP) caused some security leaders to question whether they need yet...
Lessons from the Trenches: Maintaining Effective Security in Cloud
ICG Consulting provides cloud hosting and managed security services for their financial back-office solution customers who want to deploy ICG’s applications without the usual headaches of complex cloud infrastructure.
Software Supply Chain Security Best Practices
Explore the fundamentals of software supply chain security providing useful tips to help you navigate its complexities and best practices to secure it.
Prometheus Got Out of Hand, Discover What Bloomreach Did Next – EMEA
How do you architect cloud instrumentation? Securing a complex and diverse environment like an enterprise cloud infrastructure is not easy.
Kubernetes RBAC and TLS certificates – Kubernetes security guide (part 1).
Kubernetes RBAC security context is a fundamental part of your Kubernetes security best practices, as well as rolling out TLS...
Kubernetes is a beast: Tame its security related events (using Falco based rules with Sysdig Secure runtime policies) – EMEA
In this webinar, we will showcase how Sysdig Secure can simplify Kubernetes security by providing out-of-the-box policies and easily digestible events. We will also present a use-case based on the daily administration effort that Kubernetes specialists face and how Sysdig Secure (using Falco) can enable effective security on Kubernetes
Why Companies Still Struggle with Least Privilege in the Cloud
Vulnerabilities are only one part of the cloud security story. Misconfigurations are still the biggest player in security incidents and,...