Sysdig Site Search
How to implement Docker image scanning with open source tools
In this article we will cover Docker image scanning with open source image scanning tools. We will explain how to...
What’s New in Sysdig – July 2023
“What’s New in Sysdig” is back with the July 2023 edition! My name is Curtis Collicutt, based in Toronto, Canada,...
How to Deal with Hundreds of Fixes? Choosing the Right Vulnerability Management Solution
Relying solely on the Common Vulnerability Scoring System (CVSS) is insufficient when it comes to effective vulnerability management. While the...
Track risk trends in your container images with Sysdig risk-based vulnerability management
The number of detected common vulnerabilities and exposures (CVEs) has significantly increased in the past decade. In the last five...
Reduce resolution time for container vulnerabilities with ServiceNow & Sysdig
Read about our collaboration with ServiceNow to provide a Container Vulnerability Response (CVR) plugin that ingests runtime insights into ServiceNow to help users prioritize the remediation of vulnerabilities that represent real risk.
Chaos Malware Quietly Evolves Persistence and Evasion Techniques
The name Chaos is being used for a ransomware strain, a remote access trojan (RAT), and now a DDoS malware...
AWS CloudTrail vs CloudWatch: Log Differences
What is different about cloud log management versus on-premises? The answer may seem simple, but several elements such as CloudTrail...
What’s new in Sysdig – October 2022
Welcome to the October edition of What’s New in Sysdig in 2022! I’m Tushar Kapadi, Sr. Solution Architect based out...
Cloud DNS Security – How to protect DNS in the Cloud
When using DNS in the Cloud, security cannot be overlooked. This article is for cloud architects and security practitioners who...
Detecting suspicious activity on AWS using cloud logs
AWS offers a large spectrum of services and compute. The “shared responsibility” model in cloud presents a simplified structure of...