background graphic

Sysdig Site Search

Showing 551-560 of 568

Not your Parent’s Cloud Security: Real-time Cloud Threat Detection for GCP

webinars

Google Cloud Audit Logs record administrative actions and configuration changes in your cloud account. How can you better use this resource in real-time to spot and prioritize cloud threats?

Becoming a Cloud Security Ninja: Slice Your SIEM Costs by Pre-Processing Cloud Logs

webinars

The cloud threat landscape has evolved with the complex, and dynamic nature of the cloud provider platforms and the multitude of services that are available with the click of a button.

26 AWS security best practices to adopt in production

Blog

Security is a fundamental pillar of the AWS Foundational Security Best Practices. To minimize security risks and protect your environment,...

5 Attack Tactics to Guard against using MITRE ATT&CK for AWS

webinars

How can you pull together a unified and simple approach to speed up detection and response for security across your AWS cloud workloads?

Securing the DevSecOps Pipeline with Shift Left + Runtime Security

webinars

Modern DevOps teams are adopting GitOps principles: provisioning workloads using infrastructure-as-code (IaC) tools and managing policies as code using open source tools like Open Policy Agent (OPA)

Securing Serverless Containers on AWS Fargate

webinars

Join us to hear how Sysdig uniquely solves the serverless visibility challenge so you can confidently secure AWS Fargate serverless containers at scale.

FIND, FOCUS, and FIX the Cloud Threats that Matter Solutions Forum

webinars

Join Sysdig, who’s driving the standard for cloud and container security, alongside other industry experts, customers, and partners - for an insightful exchange of cloud security best practices, tips, and recommendations.

A Comprehensive Approach to Cloud Threat Detection and Response

webinars

In this webinar, SANS Sr. Instructor Jake Williams and Mike Isbitski, Director of Cybersecurity Strategy, Sysdig, make the case for implementing a combination of agent-based and agentless cloud-native security tooling, an approach that provides outcomes far superior than either solution on its own.

KubeCon EU 2022 – Trends & Highlights

Blog

Kubecon EU returned to Spain. This time to Valencia, city of paella and horchata and, of course, a great place...

CSPM Best Practices for Multi-Cloud: Beyond Native Tools

webinars

Join Sysdig to understand the fundamentals on cloud categories and terms like CSPM, CWPP, CNAPP, etc. so you can move past the acronyms and onto implementing them as best practices.

1 54 55 56 57

Stay up to date! Sign up to receive our newsletter.