Sysdig Site Search
What’s New in Sysdig – July 2023
“What’s New in Sysdig” is back with the July 2023 edition! My name is Curtis Collicutt, based in Toronto, Canada,...
How to Monitor Your Windows Infrastructure
Nowadays many organizations still rely on classic Windows servers and virtual machines (VMs) for their business applications. Although Kubernetes is...
Kubernetes security context, security policy, and network policy – Kubernetes security guide (part 2).
Once you have defined Kubernetes RBAC: users and services credentials and permissions, we can start leveraging Kubernetes orchestration capabilities to...
Guidelines: How to reduce the noise of Falco rules in Sysdig Secure
Rule tuning is one of the most important steps during the definition of the security posture. With the detection rules,...
MITRE ATT&CK and D3FEND for Cloud and Containers
MITRE ATT&CK and MITRE D3FEND are both frameworks developed by the non-profit organization MITRE, but they serve different purposes. If...
SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft
The Sysdig Threat Research Team recently discovered a sophisticated cloud operation in a customer environment, dubbed SCARLETEEL, that resulted in...
OWASP Kubernetes Top 10
One of the biggest concerns when using Kubernetes is whether we are complying with the security posture and taking into...
Introducing kube-state-metrics support — complete Kubernetes state monitoring
We’re thrilled to announce the expansion of Sysdig Monitor integration with Kubernetes with the release of kube-state-metrics support. Now, you...
What’s New in Sysdig – November 2022
What’s New in Sysdig is back again with the November 2022 edition! I am Matt Shirilla, an Enterprise Sales Engineer...
CSPM – Least privilege principle in practice
Cloud Security Posture Management (CSPM) aims to automate the identification and remediation of risks across your entire cloud infrastructure. A...