Sysdig Site Search
Introducing Sysdig custom risk insights – strengthen cloud security posture management
Attack surfaces in the cloud are expanding at a breakneck pace. Cloud security has reached an unprecedented level of complexity...
Manage AppArmor profiles in Kubernetes with kube-apparmor-manager
Discover how Kube-apparmor-manager can help you manage AppArmor profiles on Kubernetes to reduce the attack surface of your cluster. AppArmor...
Detecting ‘Leaky Vessels’ Exploitation in Docker and Kubernetes
Summary On January 31st 2024, Snyk announced the discovery of four vulnerabilities in Kubernetes and Docker. For Kubernetes, the vulnerabilities...
Sysdig 2022 Cloud-Native Security and Usage Report: Stay on Top of Risks as You Scale
The fifth annual Sysdig Cloud-Native Security and Usage Report digs into how Sysdig customers of all sizes and industries are...
Detect suspicious activity in GCP using audit logs
GCP audit logs are a powerful tool that track everything happening in your cloud infrastructure. By analyzing them, you can...
Introducing the new Sysdig Secure policy editor
Among many other features Sysdig Secure version 2.4 introduces a new and improved runtime policy editor, along with a comprehensive...
How to detect Kubernetes vulnerability CVE-2019-11246 using Falco
A recent CNCF-sponsored Kubernetes security audit uncovered CVE-2019-11246, a high-severity vulnerability affecting the command-line kubectl tool. If exploited, it could...
CSI Forensics: Unraveling Kubernetes Crime Scenes
This is the second episode of the CSI Container series, published and presented at CloudNativeSecurityCon 2024. In this episode, we...
Protect your Docker containers using Falco security rules.
Falco is an open source project for intrusion and abnormality detection for Cloud Native platforms such as Kubernetes or Docker....
Securing the DevSecOps Pipeline with Shift Left + Runtime Security
Modern DevOps teams are adopting GitOps principles: provisioning workloads using infrastructure-as-code (IaC) tools and managing policies as code using open source tools like Open Policy Agent (OPA)