Sysdig Site Search
Five Things CISOs in Financial Services can do to make Containers Secure and Compliant
As competition ramps up in the financial services sector, agile cloud application development is critical to delivering seamless digital experiences customers want. Cloud-native development brings new security and compliance implications. Learn more on what you can do to respond to cloud security risk.
Container Drift Detection with Falco
DIE is the notion that an immutable workload should not change during runtime; therefore, any observed change is potentially evident...
2021 Container Security and Usage Report
For the past four years, we’ve provided insights into container usage through real-time, real-world customer data. In this report, you will find further detail about security, compliance, services, alerting, and Kubernetes usage patterns. This information can be useful for determining the real-world state of security and usage for container environments at companies around the world, from a broad range of industries.
Sysdig Scales to Meet Cloud Security Demand with an Expansion to the Executive Team
Company appoints two industry veterans as engineering vice presidents SAN FRANCISCO – April 14, 2020 — Sysdig, Inc., the secure...
Secure and monitor AWS Outposts and hybrid clouds
Today we announced that Sysdig has demonstrated successful integration of our monitoring and security software with AWS Outposts, and achieved...
On-Prem and Kubernetes: A delicate relationship
In cloud security, context is everything. In the previous two installments of our Customers Care Chronicles, we wrote about how...
Sysdig Monitor 3.0 – Enterprise-grade Prometheus, Kubernetes insights & more
Today we announced the launch of enterprise-grade Prometheus monitoring with Sysdig Monitor 3.0. We’ve added new Prometheus capabilities like PromQL,...
Trends at Blackhat Asia 2022 – Kubernetes, Cloud Security and more
This week, BlackHat Asia 2022 took place in hybrid mode. It’s one of the most important events within the #infosec...
Guidelines: How to reduce the noise of Falco rules in Sysdig Secure
Rule tuning is one of the most important steps during the definition of the security posture. With the detection rules,...
Evolving cloud security: Why identity infused CDR is the key
Minimizing the time to detect, investigate and respond to threats is crucial in stopping cloud attacks. In fact, this might...