background graphic

Sysdig Site Search

Showing 441-450 of 485

Architecting Cloud Instrumentation

Blog

Architecting cloud instrumentation to secure a complex and diverse enterprise infrastructure is no small feat. Picture this: you have hundreds...

Spotting Vulnerabilities at Rest and at Runtime

webinars

According to Gartner, 99% of all cloud security failures will fall on the customer. Cloud security risks are complex and constantly evolving. That’s why Sysdig works to help organisations such as Talend, a Qlik Company, to protect their cloud native apps and deployments.

Kubernetes Security: from image creation to container incident response.

webinars

How do you architect cloud instrumentation? Securing a complex and diverse environment like an enterprise cloud infrastructure is not easy.

Cloud Security: Turns Out We Needed Another Acronym (CNAPP)

Blog

Gartner’s 2023 “Market Guide for Cloud-Native Application Protection Platforms” (CNAPP) caused some security leaders to question whether they need yet...

Lessons from the Trenches: Maintaining Effective Security in Cloud

webinars

ICG Consulting provides cloud hosting and managed security services for their financial back-office solution customers who want to deploy ICG’s applications without the usual headaches of complex cloud infrastructure.

Software Supply Chain Security Best Practices

guides

Explore the fundamentals of software supply chain security providing useful tips to help you navigate its complexities and best practices to secure it.

Prometheus Got Out of Hand, Discover What Bloomreach Did Next – EMEA

webinars

How do you architect cloud instrumentation? Securing a complex and diverse environment like an enterprise cloud infrastructure is not easy.

Kubernetes RBAC and TLS certificates – Kubernetes security guide (part 1).

Blog

Kubernetes RBAC security context is a fundamental part of your Kubernetes security best practices, as well as rolling out TLS...

Kubernetes is a beast: Tame its security related events (using Falco based rules with Sysdig Secure runtime policies) – EMEA

webinars

In this webinar, we will showcase how Sysdig Secure can simplify Kubernetes security by providing out-of-the-box policies and easily digestible events. We will also present a use-case based on the daily administration effort that Kubernetes specialists face and how Sysdig Secure (using Falco) can enable effective security on Kubernetes

Why Companies Still Struggle with Least Privilege in the Cloud

Blog

Vulnerabilities are only one part of the cloud security story. Misconfigurations are still the biggest player in security incidents and,...

1 43 44 45 46 47 49

Stay up to date! Sign up to receive our newsletter.