Sysdig Site Search
Containerized AppSec from Code to Production w/ Snyk, Sysdig and AWS
Snyk and Sysdig have partnered to help developers and security teams easily find and fix open source and container vulnerabilities in development, then analyze running workloads in production to identify vulnerable packages executed at runtime.
Protecting Against Log4j Attacks in AWS Fargate
Join us for a live demo of a Log4j attack on a Fargate task and how to detect it in real-time! We'll share best practices around detection and mitigation of the log4j vulnerability running in serverless environments.
Cloud and Container Runtime Security on AWS
Join us to learn how Sysdig Secure extends the open-source Falco runtime security engine, and saves time creating and maintaining runtime policies. Our rules map to MITRE ATT&CK framework, NIST and PCI, along with other container/Kubernetes runtime detection and cloud security threat policies.
A Ceph guide for Kubernetes and OpenShift users
Ceph is a self-hosted distributed storage system popular among organizations using containers in production. For those looking for a storage solution in their containerized infrastructure, we created this guide to cover: How to Deploy Ceph on AWS, Quick Introduction to Ceph and alternatives, and How to Deploy Ceph on AWS.
Scarleteel 2.0 and the MITRE ATT&CK framework
In this blog post, we will take a comprehensive dive into a real-world cyber attack that reverberated across the digital...
5 Easy Ways to Secure Images & Prioritize Risk from Source to Run On AWS
Do you want to ensure images are free of vulnerabilities and meet best practices before pushing to production? Participants will learn how Sysdig Secure can identify vulnerabilities pre-production and at runtime.
Manage Excessive Permissions and Entitlements in AWS
Organizations often grant overly permissive privileges to users and services that are often unused. This level of access exposes you, enabling adversaries to hack into the cloud and perform malicious activity.
How to be Compliant with Mandates from SOC2, PCI, NIST etc. for your AWS Cloud infrastructure
Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks.
Continuous Compliance on AWS
Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks.
Image Scanning on AWS
Do you want to ensure images are free of vulnerabilities and meet best practices before pushing to production? Participants will learn how Sysdig Secure can identify vulnerabilities pre-production and at runtime.