Sysdig Site Search
24 Google Cloud Platform (GCP) security best practices
You’ve got a problem to solve and turned to Google Cloud Platform and follow GCP security best practices to build...
Detect suspicious activity in GCP using audit logs
GCP audit logs are a powerful tool that track everything happening in your cloud infrastructure. By analyzing them, you can...
Easily Monitor Google Cloud with Sysdig’s Managed Prometheus
Read about monitoring Google Cloud services and how to incorporate GCP metrics in Sysdig Monitor.
How Much Does Your Managed Service for Prometheus Cost?
Read about options for managed Prometheus monitoring and gain insight into how to control costs.
5 Steps to Securing GCP Cloud Infrastructure
Tackling unique cloud security risks requires a continuous and automated approach. Our checklist outlines how organizations can set up the security strategy to follow as they move to the cloud.
Not your Parent’s Cloud Security: Real-time Cloud Threat Detection for GCP
Google Cloud Audit Logs record administrative actions and configuration changes in your cloud account. How can you better use this resource in real-time to spot and prioritize cloud threats?
Sysdig Announces Availability of its Visibility and Security Platform for Google Cloud’s Anthos.
Sysdig supports multi-cloud Kubernetes visibility and security with Anthos as an early access partner and introduces cloud-native platform in GCP Marketplace. April 9, 2019.
What’s New in Sysdig – March & April 2023
“What’s New in Sysdig” is back with the March and April 2023 edition! Happy International Women’s Day! Happy St. Patrick’s...
Sysdig Secure Pricing
Discover what are the Google Cloud Platform security best practices for several services. Including IAM, GKE, Big Query, and more!
Extortion in Cloud Storage
Extortion can simply be defined as “the practice of obtaining benefit through coercion.“ Data and cloud extortion schemes occur when...