Sysdig Site Search
Finding Suspicious Events with AWS CloudTrail: Fundamentals and Best Practices
You see the headlines, and think, “thank goodness it wasn’t us”. An overly permissive web server exposes 100 million+ consumer credit applications in an S3 bucket, leaving hundreds of millions of user records open to the public.
Containerized AppSec from Code to Production w/ Snyk, Sysdig and AWS
Snyk and Sysdig have partnered to help developers and security teams easily find and fix open source and container vulnerabilities in development, then analyze running workloads in production to identify vulnerable packages executed at runtime.
Protecting Against Log4j Attacks in AWS Fargate
Join us for a live demo of a Log4j attack on a Fargate task and how to detect it in real-time! We'll share best practices around detection and mitigation of the log4j vulnerability running in serverless environments.
A Ceph guide for Kubernetes and OpenShift users
Ceph is a self-hosted distributed storage system popular among organizations using containers in production. For those looking for a storage solution in their containerized infrastructure, we created this guide to cover: How to Deploy Ceph on AWS, Quick Introduction to Ceph and alternatives, and How to Deploy Ceph on AWS.
Cloud and Container Runtime Security on AWS
Join us to learn how Sysdig Secure extends the open-source Falco runtime security engine, and saves time creating and maintaining runtime policies. Our rules map to MITRE ATT&CK framework, NIST and PCI, along with other container/Kubernetes runtime detection and cloud security threat policies.
5 Easy Ways to Secure Images & Prioritize Risk from Source to Run On AWS
Do you want to ensure images are free of vulnerabilities and meet best practices before pushing to production? Participants will learn how Sysdig Secure can identify vulnerabilities pre-production and at runtime.
Manage Excessive Permissions and Entitlements in AWS
Organizations often grant overly permissive privileges to users and services that are often unused. This level of access exposes you, enabling adversaries to hack into the cloud and perform malicious activity.
Scarleteel 2.0 and the MITRE ATT&CK framework
In this blog post, we will take a comprehensive dive into a real-world cyber attack that reverberated across the digital...
Cloud Security for Amazon Web Services
This guide offers a framework for establishing comprehensive security for cloud and containers in AWS environments with specific insights into how Sysdig complements AWS-native tools.
Image Scanning on AWS
Do you want to ensure images are free of vulnerabilities and meet best practices before pushing to production? Participants will learn how Sysdig Secure can identify vulnerabilities pre-production and at runtime.