Sysdig Site Search
Zero Trust Security for OpenShift and Hybrid Cloud
The constant risk of security breaches is driving DevOps and cloud teams to embrace a Zero Trust approach to security. It’s critical to lock down your environment, but at the same time, you don’t want to break existing applications and workflows.
Kubernetes Monitoring Checklist
You are adopting a DevOps approach, using Kubernetes and containers to accelerate innovation. Kubernetes and container monitoring is critical to managing application performance, service uptime and troubleshooting. Click to learn more.
Sysdig Celebrates Falco Graduation Within Cloud Native Computing Foundation
With over 100 million downloads and contributions from companies like IBM, Apple, and Booz Allen Hamilton, Falco is the threat...
Cloud lateral movement: Breaking in through a vulnerable container
Lateral movement is a growing concern with cloud security. That is, once a piece of your cloud infrastructure is compromised,...
Secure and monitor your containers on Bottlerocket from AWS
Sysdig is pleased to support AWS today in their GA launch of Bottlerocket, a special-purpose operating system designed for hosting...
Service based access control with Sysdig Secure Teams.
While you’re likely familiar with role-based access control, Sysdig teams introduce the concept of service-based access control. With service-based access...
Container Image Scanning on Jenkins with Sysdig
Scanning a container image for vulnerabilities or bad practices on Jenkins using Sysdig Secure is a straightforward process. This article...
How to deal with ransomware on Azure
Let’s dig deeper into the techniques used by attackers and the mitigations you should implement when ransomware on Azure affects...
Automated Falco rule tuning
We recently released the automated Falco rule tuning feature in Sysdig Secure. Out-of-the-box security rules are a double-edged sword. On...
2021 Container Security and Usage Snapshot
In 2020, we saw an acceleration of cloud adoption that led to an increase in container usage. This increase, combined with the fact that half of containers live less than five minutes, reinforces the need to manage container-specific security risks. Our goal is to shed light on the current state of container infrastructure, applications, security, and compliance practices.