Sysdig Site Search
Top 10 Indicators of Compromise in Kubernetes
In this blog, you will learn how monitoring data from your Kubernetes environments can be used to detect indicators of...
Securing AWS IAM with Sysdig Secure
Last year’s IDC’s Cloud Security Survey found that nearly 80 percent of companies polled have suffered at least one cloud...
Optimizing Wireshark in Kubernetes
In Kubernetes, managing and analyzing network traffic poses unique challenges due to the ephemeral nature of containers and the layered...
Amazon EKS monitoring and security with Sysdig
Amazon Elastic Container Service for Kubernetes (Amazon EKS) provides Kubernetes as a managed service on AWS. It helps make it easier to deploy, manage and scale containerized applications on Kubernetes.
Detect CVE-2020-8554 – Unpatched Man-In-The-Middle (MITM) Attack in Kubernetes
The Kubernetes API server, in all versions of Kubernetes, unfortunately allows an attacker, who is able to create a ClusterIP...
24 Google Cloud Platform (GCP) security best practices
You’ve got a problem to solve and turned to Google Cloud Platform and follow GCP security best practices to build...
Sysdig Launches AI Workload Security to Mitigate Active AI Risk
New capability helps companies gain visibility into their AI workloads, identify active risk and suspicious activity in real time, and...
Snyk
Enable end-to-end cloud and container security and prioritize vulnerabilities with Snyk ASPM and Sysdig CNAPP.
Five things CISOs can do to make containers secure and compliant
Chances are, if you’re not already moving applications to containers and Kubernetes, you’re considering it. However, it’s likely that security...
How attackers use exposed Prometheus server to exploit Kubernetes clusters
You might think that your metrics are harmless from a security point of view. Well, that’s not true, and in...