background graphic

Sysdig Site Search

Showing 271-280 of 844

Introducing Sysdig custom risk insights – strengthen cloud security posture management

Blog

Attack surfaces in the cloud are expanding at a breakneck pace. Cloud security has reached an unprecedented level of complexity...

Manage AppArmor profiles in Kubernetes with kube-apparmor-manager

Blog

Discover how Kube-apparmor-manager can help you manage AppArmor profiles on Kubernetes to reduce the attack surface of your cluster. AppArmor...

Detecting ‘Leaky Vessels’ Exploitation in Docker and Kubernetes

Blog

Summary On January 31st 2024, Snyk announced the discovery of four vulnerabilities in Kubernetes and Docker.  For Kubernetes, the vulnerabilities...

Sysdig 2022 Cloud-Native Security and Usage Report: Stay on Top of Risks as You Scale

Blog

The fifth annual Sysdig Cloud-Native Security and Usage Report digs into how Sysdig customers of all sizes and industries are...

Detect suspicious activity in GCP using audit logs

Blog

GCP audit logs are a powerful tool that track everything happening in your cloud infrastructure. By analyzing them, you can...

Introducing the new Sysdig Secure policy editor

Blog

Among many other features Sysdig Secure version 2.4 introduces a new and improved runtime policy editor, along with a comprehensive...

How to detect Kubernetes vulnerability CVE-2019-11246 using Falco

Blog

A recent CNCF-sponsored Kubernetes security audit uncovered CVE-2019-11246, a high-severity vulnerability affecting the command-line kubectl tool. If exploited, it could...

CSI Forensics: Unraveling Kubernetes Crime Scenes

Blog

This is the second episode of the CSI Container series, published and presented at CloudNativeSecurityCon 2024. In this episode, we...

Protect your Docker containers using Falco security rules.

Blog

Falco is an open source project for intrusion and abnormality detection for Cloud Native platforms such as Kubernetes or Docker....

Securing the DevSecOps Pipeline with Shift Left + Runtime Security

webinars

Modern DevOps teams are adopting GitOps principles: provisioning workloads using infrastructure-as-code (IaC) tools and managing policies as code using open source tools like Open Policy Agent (OPA)

1 26 27 28 29 30 85

Stay up to date! Sign up to receive our newsletter.