background graphic

Sysdig Site Search

Showing 381-390 of 855

Gee-Wiz! What a $30B Acquisition Means for Cloud Security and AI

webinars

The cloud security landscape changed overnight. With Google’s $30B+ acquisition of Wiz, CISOs, security leaders, and multi-cloud teams are left asking: What happens next?

FIX WHAT MATTERS: Bridging Code and Cloud Security

webinars

Learn how to boost your software supply chain security and address risk for containers and Kubernetes from development through production.

Security Operations Provider Reduces Vulnerabilities by 95%

case studies

Security firm cut vuln triage time by 80% and reduced runtime risks 95% using Sysdig’s prioritization and forensic tools.

Comparing GuardDuty & Falco on EKS

Blog

Read about the differences between Amazon GuardDuty and Falco for Amazon EKS to better understand what each tool does, the threats detected, and the metadata available for forensic analysis.

Software Supply Chain Security Best Practices

guides

Explore the fundamentals of software supply chain security providing useful tips to help you navigate its complexities and best practices to secure it.

Guide to OWASP Top 10 for Kubernetes

guides

This guide on OWASP Top 10 for Kubernetes provides valuable information and best practices beyond the original OWASP guidance, and that applies broadly to most Kubernetes environments.

Fixing potential security issues in your Infrastructure as Code at the source with Sysdig

Blog

Infrastructure as Code (IaC) is a powerful mechanism to manage your infrastructure, but with great power comes great responsibility. If...

Secure DevOps Practices at Yahoo Japan

videos

With more than 3,000 developers and a large Kubernetes environment, learn how Yahoo Japan is preventing cyber-attacks and unauthorized access by introducing appropriate security measures for the container environment.

5 minutes to onboard secure DevOps

videos

Today, we are excited to announce a faster onboarding for Kubernetes visibility and security. With the SaaS-first approach and new enhancements to the Sysdig...

Vulnerability Management

page

Full lifecycle agentless and runtime vulnerability management.

1 37 38 39 40 41 86

Stay up to date! Sign up to receive our newsletter.