Sysdig Site Search
Lambda Threat – Best Practices for Lambda Security
Our security research team will explain a real attack scenario from the black box and white box perspective on how...
Kubernetes network segmentation using native controls
Network segmentation is almost as old as computer networking. The evolution of network segmentation went through switches to routers and...
More than an Assistant – A New Architecture for GenAI in Cloud Security
There is no question that cybersecurity is on the brink of an AI revolution. The cloud security industry, for example,...
Support
The security research team explains the attack scenario with a vulnerable AWS Lambda function could be a threat used by attackers.
Attack of the mutant tags! Or why tag mutability is a real security threat
Tag mutability can introduce multiple functional and security issues. In container land, tags are a volatile reference to a concrete...
Falco 0.13.0 Released: Kubernetes Audit Events Support
We recently released Falco 0.13.0, which is probably the most exciting release since Falco’s 0.1.0 release almost two and a...
Introducing Managed Policies for Sysdig Secure
Whether you’re learning cloud-native workload protection for the first time or running all your microservice workloads in production, you probably...
What’s new in Sysdig Secure: January 2020
We’ve been busy this New Year (a rather warm one in San Francisco) to bring you exciting new ways to...
BlaBlaCar Security Team of Four Empowers Developers to Manage Security Risk With Sysdig
BlaBlaCar empowers 200+ developers to manage risk with Sysdig, reducing overhead with secure DevOps at scale.