Sysdig Site Search
How to use Atomic Red Team to test Falco rules in K8s
The best way to know if something works is to try it out. Ensuring that your security products are actually...
Automated Falco rule tuning
We recently released the automated Falco rule tuning feature in Sysdig Secure. Out-of-the-box security rules are a double-edged sword. On...
Responding to the Dropbox Breach with a Falco GitHub Plugin
On November 1st, Dropbox disclosed a security breach where the attackers stole over 130 code repositories after gaining access to...
Getting started with Kubernetes audit logs and Falco
As Kubernetes adoption continues to grow, Kubernetes audit logs are a critical information source to incorporate in your Kubernetes security...
Container security orchestration with Falco and Splunk Phantom.
Container security orchestration allows to define within your security policy how you are going to respond to your different container...
Falco 0.6.0 Released
We just released Falco 0.6.0. This has several great new features as well as continued improvement to the default ruleset....
Announcing Falco 0.4.0
Falco Release 0.4.0 Yesterday we released Falco 0.4.0. It’s been a couple of months since 0.3.0, but there are lots...
Falco 0.5.0 now available
Falco 0.5.0 Released We recently released Falco 0.5.0, the behavioral security monitor. This release has a little bit of everything–new...
Google Summer of Code with Falco.
As part of Falco’s participation in the Cloud Native Computing Foundation, we are excited to announce we will be mentoring...
Introducing Falco: Open source, behavioral security from Sysdig
*There are a million ways a burglar can break into your home, but once they do they’re going to steal...