background graphic

Sysdig Site Search

Showing 41-50 of 528

How to use Atomic Red Team to test Falco rules in K8s

Blog

The best way to know if something works is to try it out. Ensuring that your security products are actually...

Automated Falco rule tuning

Blog

We recently released the automated Falco rule tuning feature in Sysdig Secure. Out-of-the-box security rules are a double-edged sword. On...

Responding to the Dropbox Breach with a Falco GitHub Plugin

Blog

On November 1st, Dropbox disclosed a security breach where the attackers stole over 130 code repositories after gaining access to...

Getting started with Kubernetes audit logs and Falco

Blog

As Kubernetes adoption continues to grow, Kubernetes audit logs are a critical information source to incorporate in your Kubernetes security...

Container security orchestration with Falco and Splunk Phantom.

Blog

Container security orchestration allows to define within your security policy how you are going to respond to your different container...

Falco 0.6.0 Released

Blog

We just released Falco 0.6.0. This has several great new features as well as continued improvement to the default ruleset....

Announcing Falco 0.4.0

Blog

Falco Release 0.4.0 Yesterday we released Falco 0.4.0. It’s been a couple of months since 0.3.0, but there are lots...

Falco 0.5.0 now available

Blog

Falco 0.5.0 Released We recently released Falco 0.5.0, the behavioral security monitor. This release has a little bit of everything–new...

Google Summer of Code with Falco.

Blog

As part of Falco’s participation in the Cloud Native Computing Foundation, we are excited to announce we will be mentoring...

Introducing Falco: Open source, behavioral security from Sysdig

Blog

*There are a million ways a burglar can break into your home, but once they do they’re going to steal...

1 3 4 5 6 7 53

Stay up to date! Sign up to receive our newsletter.