Sysdig Site Search
Software Supply Chain Security Best Practices
Explore the fundamentals of software supply chain security providing useful tips to help you navigate its complexities and best practices to secure it.
Kubernetes RBAC and TLS certificates – Kubernetes security guide (part 1).
Kubernetes RBAC security context is a fundamental part of your Kubernetes security best practices, as well as rolling out TLS...
Kubernetes is a beast: Tame its security related events (using Falco based rules with Sysdig Secure runtime policies) – EMEA
In this webinar, we will showcase how Sysdig Secure can simplify Kubernetes security by providing out-of-the-box policies and easily digestible events. We will also present a use-case based on the daily administration effort that Kubernetes specialists face and how Sysdig Secure (using Falco) can enable effective security on Kubernetes
Why Companies Still Struggle with Least Privilege in the Cloud
Vulnerabilities are only one part of the cloud security story. Misconfigurations are still the biggest player in security incidents and,...
A Hacker’s Secrets to Ethically Cracking the Code in Today’s Digital World with Dr. Charlie Miller
Join us for a fireside chat with renowned ‘White Hat’ hacker, Dr. Charlie Miller. He will share details about his own behind-the-scenes journeys and how hackers exploit vulnerabilities and why corporations and governments should address cybersecurity before assets—or lives—are put at risk.
Exploring the 2022 State of DevOps Report with Google and Sysdig
Join Derek DeBellis, an expert quantitative UX researcher from Google Cloud, and our host Eric Carter from Sysdig to discuss the key findings from the “2022 State of DevOps Report” (DORA).
Dig Deeper! Prioritize Cloud Vulnerabilities and Reduce Container Spending
Bad actors will find a way into your infrastructure whether through traditional approaches like misconfigurations and vulnerabilities; or more advanced approaches such as exploiting your supply chain, impersonating a user with stolen credentials, cloud entitlements, or other techniques.
How to build a Kubernetes Horizontal Pod Autoscaler using custom metrics
The default Kubernetes Horizontal Pod Scaler (HPA) uses CPU load, in this article we will show how to configure it...
gVisor+Falco: Strengthen K8s & Container Security Without Losing Visibility
Hear from the gVisor and Falco community developers that made it possible to leverage the powerful gVisor isolation and sandboxing capabilities while enjoying Falco’s deep visibility and flexible detection engine.