background graphic

Sysdig Site Search

Showing 361-370 of 846

Millions wasted on Kubernetes resources

Blog

The Sysdig 2023 Cloud-Native Security and Container Usage Report has shed some light on how organizations are managing their cloud...

Cybersecurity Strategy Must Include Both Shift-Left and Shield-Right Approaches

whitepapers

Cyber attacks are an unfortunate reality in our interconnected world. The art of keeping up with malicious actors is challenging, but even more so with the move to cloud-native technologies. As a result, security is evolving. Developers, DevOps, and cloud teams must now learn a new set of best practices that balance shift-left security and shield-right security approaches to reduce risk. This white paper developed in collaboration with our partner, Snyk, the leader in developer security, describe the underpinnings of modern cybersecurity programs in the world of containers, Kubernetes, and cloud.

Becoming a Cloud Security Ninja: Slice Through Alerts and Prioritize What Matters

webinars

Join Sysdig, who’s driving the standard for cloud and container security, alongside Tag Cyber, for a discussion around cloud security best practices, tips, and recommendations.

Sysdig Secure Product Overview

videos

Our newest member to the family, Sysdig Secure, is designed to provide container security + forensics for enterprises with distributed,...

Sysdig Advisor: Making Kubernetes troubleshooting effortless

Blog

The cloud, Kubernetes, CI/CD, DevOps, GitOps… the last five years have seen a huge transformation in how organizations are architecting...

What’s new in Sysdig – September 2021

Blog

Welcome to another monthly update on what’s new from Sysdig! Happy Janmashtami! Shanah Tovah! 中秋快乐! With lockdown lift...

Sysdig and Camptocamp announce partnership for strong cloud security based on open source

Blog

The cloud has become the hub of modern data traffic. It offers organizations of all sizes unprecedented speed, flexibility, and...

Introducing Custom Controls in Sysdig Secure 

Blog

In the context of cloud security posture management (CSPM), custom controls are policies or rules that give security teams the...

Detect Container Security Threats

webinars

Looking to use open source tools to prepare, detect and respond to security threats in containers and Kubernetes? Wondering how you can create perimeters in the cloud?

Tackle cloud-native adoption and security hurdles with Coforge and Sysdig

Blog

This is a guest blog by Ashu Deep Saxena (Senior Practice Lead, Cloud Modernization, Coforge, a Sysdig GSI partner) with...

1 35 36 37 38 39 85

Stay up to date! Sign up to receive our newsletter.