background graphic

Sysdig Site Search

Showing 31-40 of 528

Why Runtime Insights

page

Using Falco you can create Docker security policies to detect intrusions and abnormal behaviour. This article will get you started with the Falco syntax.

SELinux, Seccomp, Sysdig Falco, and you: A technical discussion

Blog

One of the questions we often get when we talk about Sysdig Falco is How does it compare to other...

Day 2 Falco Container Security – Tuning the Rules

Blog

In the world of cybersecurity, noise is a critical issue associated with Day 2 operations. The complex nature of noise...

Pet surveillance with Falco – Home Security

Blog

If you are here, chances are that your pet is always running around, destroying things in your sweet house. We...

Active Kubernetes security with Sysdig Falco, NATS, and Kubeless.

Blog

The composability of Cloud Native platforms has dramatically changed the way we think about the management of these platforms. In...

Cryptojacking detection with Sysdig’s Falco

Blog

The latest rage amongst attackers appears to be cryptojacking; rather, exploiting a system, and installing cryptocurrency miners to earn money...

How to identify malicious IP activity using Falco

Blog

One of the most common security use cases, is the ability to identify connections generated by malicious actors, or internal...

Protect your Docker containers using Falco security rules.

Blog

Falco is an open source project for intrusion and abnormality detection for Cloud Native platforms such as Kubernetes or Docker....

Falco 0.8.1 Released

Blog

We just released Falco 0.8.1. This has a great list of new features and rule improvements. Rule Improvements The ruleset...

Sysdig contributes Falco’s kernel module, eBPF probe, and libraries to the CNCF

Blog

Today, I’m excited to announce the contribution of the sysdig kernel module, eBPF probe, and libraries to the Cloud Native...

1 2 3 4 5 6 53

Stay up to date! Sign up to receive our newsletter.