Sysdig Site Search
Happy 10th Birthday Kubernetes!
As Kubernetes celebrates its 10th anniversary, it’s an opportune moment to reflect on the profound impact Kubernetes has had on...
Cost Advisor: Optimize and Rightsize your Kubernetes Costs
Kubernetes has broken down barriers as the cornerstone of cloud-native application infrastructure in recent years. In addition, cloud vendors offer...
Resource Constraints in Kubernetes and Security
The Sysdig 2024 Cloud‑Native Security and Usage Report highlights the evolving threat landscape, but more importantly, as the adoption of...
Sysdig Announces Google Cloud Security Partnership
Launches a unified cloud and container security platform for Google Cloud SAN FRANCISCO– September 28, 2021 — Sysdig, Inc.,...
Pod Security Policies in production with Sysdig’s Kubernetes Policy Advisor
Sysdig Secure 3.0 introduces Kubernetes Policy Advisor to provide Kubernetes native prevention using Pod Security Policies (PSPs). This feature automates...
GKE security with Falco and Google Cloud Security Command Center
A few weeks ago, we announced Sysdig partnership with Google to integrate Sysdig Secure with Google Cloud Security Command Center,...
Getting started with Kubernetes audit logs and Falco
As Kubernetes adoption continues to grow, Kubernetes audit logs are a critical information source to incorporate in your Kubernetes security...
Sysdig 2021 container security and usage report: Shifting left is not enough
The fourth annual Sysdig Container Security and Usage Report looks at how global Sysdig customers of all sizes and industries...
5 Keys to a Secure DevOps Workflow
Containers are essentially black boxes. It’s hard to see what’s going on inside, and the lifespan of a container keeps shrinking. How can you proactively manage the health of your applications and infrastructure? How can you automate security and compliance controls within your DevOps process to scale? Click to learn more.
Global Customer Data Processing Addendum
Organizations should prioritize cloud defense in depth. With a strong security plan, you can lay a foundation for a secure cloud environment.