Sysdig Site Search
The evolution of the Sysdig Agent
For the past six years, I’ve had the unique privilege of contributing to and witnessing the evolution of Sysdig Agent....
Sysdig Monitor 3.0 Adds Enterprise-Grade Prometheus Monitoring and Enhances its Rich Kubernetes and Docker Support.
Company continues to embrace open source technologies, brings scale, simplicity and security to enterprise Prometheus monitoring users. September 26, 2018.
Sysdig Usage Report Reveals that Machine Identities Outnumber Humans 40,000 to 1, Presenting a Major Challenge to Enterprise Security
Cloud defenders are gaining ground as the cloud landscape comes into focus, with 92% of organizations operating without risky human...
Vulnerability management in the microservice era: From zero to hero
In the world of cloud-native applications, microservices and Kubernetes have become the backbone of modern software architecture. The scalability, flexibility,...
Fileless Malware Detection with Sysdig Secure
In today’s digital landscape, cyber threats continue to evolve at an alarming pace, with hackers constantly finding new ways to...
GitHub & Supply Chain Risks
Contributing members of the open source project git deployed a code change in June 2022 that switched the default file...
K8s security guide.
In this K8s security guide we cover the most significant aspects of implementing K8s security best practices. K8s security, like...
Fishing for Miners – Cryptojacking Honeypots in Kubernetes
Introduction A while back, we wrote a blog post about opening an EC2 instance to the world to see who...
Hands-On Muhstik Botnet: crypto-mining attacks targeting Kubernetes
Malware is continuously mutating, targeting new services and platforms. The Sysdig Security Research team has identified the famous Muhstik Botnet...
The art of writing eBPF programs: a primer.
Interested in writing eBPF programs? In this blog, this will be our focus — the process of writing eBPF programs....