background graphic

Sysdig Site Search

Showing 81-89 of 89

Say Goodbye to PSPs?! Migrate your PSP Rules to OPA with No Hassle

webinars

One of the best alternatives for Kubernetes users to mitigate PSP deprecation is through the built-in admission controller utilizing Open Policy Agent (OPA) rules.

Reduce Alerts and False Positives – Monitor Golden Signals using Sysdig

webinars

In this deminar, we will cover why golden signals are important for modern distributed systems, how to monitor and set up alerts for Kubernetes applications using Sysdig.

Bad guys are watching for new openings in your cloud, are you?

Blog

You see the headlines, and perhaps, ‘thank goodness it wasn’t us’ flickers through your mind. An overly permissive web server...

What’s new in Sysdig – November 2020

Blog

Welcome to another monthly update on what’s new from Sysdig. Our team continues to work hard to bring great new...

Monitoring AWS Lambda with Prometheus and Sysdig

Blog

In this post, we will show how it’s easily possible to monitor AWS Lambda with Sysdig Monitor. By leveraging existing...

CSPM Best Practices for Multi-Cloud: Beyond Native Tools

webinars

Join Sysdig to understand the fundamentals on cloud categories and terms like CSPM, CWPP, CNAPP, etc. so you can move past the acronyms and onto implementing them as best practices.

Manage Excessive Permissions and Entitlements in AWS

webinars

Organizations often grant overly permissive privileges to users and services that are often unused. This level of access exposes you, enabling adversaries to hack into the cloud and perform malicious activity.

Prioritize Cloud Risk and Accelerate Remediation with Sysdig and AWS

webinars

Join Sysdig and AWS for this interactive discussion and demo and learn how to achieve better cloud and container security through effective prioritization using runtime insights.

Cloud and Container Runtime Security on AWS

webinars

Join us to learn how Sysdig Secure extends the open-source Falco runtime security engine, and saves time creating and maintaining runtime policies. Our rules map to MITRE ATT&CK framework, NIST and PCI, along with other container/Kubernetes runtime detection and cloud security threat policies.

1 7 8 9

Stay up to date! Sign up to receive our newsletter.