Sysdig Site Search
AWS Launches Improvements for Key Quarantine Policy
Recently, AWS expanded the scope of their AWSCompromisedKeyQuarantine policies (v2 and v3) to include new actions. This policy is used...
Sysdig Achieves Compliance and Auditing and Monitoring and Observability Distinctions in AWS Cloud Operations Competency
SAN FRANCISCO (April 6, 2023) – Sysdig, a leader in cloud security powered by runtime insights, announced today that it...
Providing visibility + security for AWS App Mesh.
Microservice architectures running on containers have made applications easier to scale and faster to develop. As a result, enterprises are...
Amazon S3 security with AWS CloudTrail and Falco
We have all heard about data breaches in companies like Facebook, GoDaddy, and Pocket. It’s important that access to information...
Sysdig Extends Prometheus Monitoring to Amazon CloudWatch
SAN FRANCISCO – May 20, 2020 — Sysdig, Inc., a secure DevOps leader, today announced support for five Amazon Web...
How to Secure AWS Route 53 with Sysdig
Either through human error or intentionally, configuration changes in the cloud may suddenly increase your attack surface. AWS Route 53...
Aligning Falco’s Cloudtrail Rules with MITRE ATT&CK
This blog will explain how Falco’s Cloudtrail plugin rules can be aligned with MITRE ATT&CK Framework for Cloud. One important...
Threat news: TeamTNT stealing credentials using EC2 Instance Metadata
The Sysdig Threat Research Team has detected an attack that can be attributed to the TeamTNT. The initial target was...
ECS Fargate threat modeling
AWS Fargate is a technology that you can use with Amazon ECS to run containers without having to manage servers...
Improving the Prometheus exporter for Amazon CloudWatch
A Prometheus CloudWatch exporter is a key element for anyone wanting to monitor AWS CloudWatch. Exporting CloudWatch metrics to a...