Sysdig Site Search
Mitigating log4j with Runtime-based Kubernetes Network Policies
A critical vulnerability, CVE-2021-44228 known as “log4shell,” in Apache’s log4j was revealed on December 10th, 2021, and has already seen...
Sysdig Achieves AWS Outposts Ready Designation
Sysdig allows organizations to embed security and monitoring into a secure DevOps workflow across hybrid cloud environments SAN FRANCISCO –...
Sysdig Partners with In-Q-Tel to Provide Unified Visibility and Security Platform to U.S. Government Agencies.
Together Sysdig and IQT to provide insight and control for agencies transitioning to modern IT architectures, including Kubernetes, containers, and multi-cloud deployments. May 13, 2019.
2018 Docker usage report
Our 2nd annual Docker Usage Report provides insight into real-world customer container deployments over the past year. Read about increasing densities, diversity in container runtimes, and details on what's happening with orchestrators like Kubernetes.
Secure Containers and Eliminate Noise from Code to Production with Sysdig and Snyk
Drowning in noise from container security alerts? To silence this problem, developer, DevOps, and SecOps teams need a strategy that will bridge the gap between code development, platform operations, and security controls.
Cloud and Container Runtime Security on Azure
Join us to learn how Sysdig Secure extends the open-source Falco runtime security engine, and saves time creating and maintaining runtime policies.
K3s + Sysdig: Deploying and securing your cluster… in less than 8 minutes!
As Kubernetes is eating the world, discover an alternative certified Kubernetes offering called K3s, made by the wizards at Rancher....
Day 2 Falco Container Security – Tuning the Rules
In the world of cybersecurity, noise is a critical issue associated with Day 2 operations. The complex nature of noise...
Align Your Cloud Security Plan with the Cybersecurity Exec Order
Global security breaches and the White House Executive Order (EO) have sped up the timeline to modernize cybersecurity for both the public and private sectors. The way applications are developed and deployed (in the cloud and on containers), means taking a look at cloud security, Zero Trust architectures, and regulatory compliance in order to meet the mandates, keep moving ahead of the hackers and reduce risk.
Modern Compliance With Sysdig Secure DevOps Platform
A guest post by Josh Ziman, CTO for Global Commerce & Information, on implementing compliance requirements controls in Federal environments....