Sysdig Site Search
Unified threat detection for AWS cloud and containers
Implementing effective threat detection for AWS requires visibility into all of your cloud services and containers. An application is composed...
Deploying Sysdig from the new AWS CloudFormation Public Registry
AWS CloudFormation provides an easy way to model and set up AWS resources to help you save time in deploying...
Securing AWS Fargate workloads: Meeting File Integrity Monitoring (FIM) requirements
Securing AWS Fargate serverless workloads can be tricky as AWS does not provide much detail about the internal workings. After...
Securing the new AWS App Runner service
In its mission to simplify building and running cloud-native applications for users, Amazon has announced the GA of AWS App...
Secure and monitor AWS Outposts and hybrid clouds
Today we announced that Sysdig has demonstrated successful integration of our monitoring and security software with AWS Outposts, and achieved...
Sysdig Becomes AWS Security Competency Partner in Three Categories
SAN FRANCISCO — July 26, 2022 — AWS re:Inforce (Booth #404) – Sysdig, the source to run cloud and container...
Multi-cluster security with Falco and AWS Firelens on EKS & ECS
In this blog post, we are going to teach you how to aggregate all Kubernetes security events across your AWS...
Sysdig achieves AWS Security Competency
Sysdig is an AWS Security Competency partner, providing expertise for Identity and Access Management, Threat Detection and Response, Compliance and Privacy, and Cloud Security Posture Management (CSPM).
How to Detect SCARLETEEL with Sysdig Secure
The recent SCARLETEEL incident highlights the importance of detecting security threats early in the development cycle. With Terraform state files,...
How to Secure Amazon EC2 with Sysdig
Elastic Compute Cloud (EC2) is arguably one of the most popular AWS services, and really needs no introduction but here...