Sysdig Site Search
Sysdig and Apolicy: Automating cloud and Kubernetes security with IaC security and auto-remediation
Today, Sysdig has completed the acquisition of Apolicy to enable our customers to secure their infrastructure as code. I am...
Sysdig Secure 2.4 introduces runtime profiling for anomaly detection + new policy editor for enhanced security.
Today, we are excited to announce the launch of Sysdig Secure 2.4! With this release, Sysdig adds runtime profiling to...
Cloud Defense in Depth: Lessons from the Kinsing Malware
In the face of persistent data breaches and escalating cyber threats, organizations are compelled to prioritize cloud defense in depth....
Docker
In this article we are going to see how to aggregate Kubernetes / Docker events and alerts into a centralized logs system like Elasticsearch and Splunk.
OPA
In this article we are going to see how to aggregate Kubernetes / Docker events and alerts into a centralized logs system like Elasticsearch and Splunk.
VMs & Hosts
In this article we are going to see how to aggregate Kubernetes / Docker events and alerts into a centralized logs system like Elasticsearch and Splunk.
Kubernetes 1.26 – What’s new?
Kubernetes 1.26 is about to be released, and it comes packed with novelties! Where do we begin? This release brings...
Introducing Sysdig Secure 2.2: Kubernetes auditing, compliance, and access control.
Over the past four years we’ve helped hundreds of organizations run reliable, secure, and compliant Kubernetes and Openshift clusters. Some...
5 Essential workflows for secure DevOps
Focusing on these five essential workflows for secure DevOps will help you get started implementing monitoring, security, and compliance for...
Kubernetes Monitoring
In this article we are going to see how to aggregate Kubernetes / Docker events and alerts into a centralized logs system like Elasticsearch and Splunk.