background graphic

Sysdig Site Search

Showing 341-350 of 855

Lambda Threat – Best Practices for Lambda Security

Blog

Our security research team will explain a real attack scenario from the black box and white box perspective on how...

Kubernetes network segmentation using native controls

Blog

Network segmentation is almost as old as computer networking. The evolution of network segmentation went through switches to routers and...

Sysdig vs Aqua

page

Why Sysdig Is a Better Choice Than Aqua.

More than an Assistant – A New Architecture for GenAI in Cloud Security

Blog

There is no question that cybersecurity is on the brink of an AI revolution. The cloud security industry, for example,...

Support

page

The security research team explains the attack scenario with a vulnerable AWS Lambda function could be a threat used by attackers.

Attack of the mutant tags! Or why tag mutability is a real security threat

Blog

Tag mutability can introduce multiple functional and security issues. In container land, tags are a volatile reference to a concrete...

Falco 0.13.0 Released: Kubernetes Audit Events Support

Blog

We recently released Falco 0.13.0, which is probably the most exciting release since Falco’s 0.1.0 release almost two and a...

Introducing Managed Policies for Sysdig Secure

Blog

Whether you’re learning cloud-native workload protection for the first time or running all your microservice workloads in production, you probably...

What’s new in Sysdig Secure: January 2020

Blog

We’ve been busy this New Year (a rather warm one in San Francisco) to bring you exciting new ways to...

BlaBlaCar Security Team of Four Empowers Developers to Manage Security Risk With Sysdig

case studies

BlaBlaCar empowers 200+ developers to manage risk with Sysdig, reducing overhead with secure DevOps at scale.

1 33 34 35 36 37 86

Stay up to date! Sign up to receive our newsletter.