background graphic

Sysdig Site Search

Showing 51-60 of 93

Sysdig achieves AWS DevSecOps specialization within AWS DevOps Competency

Blog

Sysdig is pleased to announce that it has achieved Amazon Web Services (AWS) DevOps Competency for development, security, and operations...

Sysdig Raises $188M at a Valuation of $1.19B to Secure Modern Cloud Applications

press releases

Funding follows accelerating growth and open source community momentum, and positions Sysdig to emerge as the leader in container and...

Sysdig Adds Unified Threat Detection Across Containers and Cloud to Combat New Lateral Movement

press releases

Sysdig introduces continuous CSPM to the Sysdig Secure DevOps Platform, multi-cloud threat detection for AWS and GCP, and a new...

Sysdig Extends Prometheus Monitoring to Amazon CloudWatch

press releases

SAN FRANCISCO – May 20, 2020 — Sysdig, Inc., a secure DevOps leader, today announced support for five Amazon Web...

Preventing cloud and container vulnerabilities

Blog

Vulnerabilities are software bugs or weaknesses that could be used by an attacker. They could be present in the operating...

AWS Launches Improvements for Key Quarantine Policy

Blog

Recently, AWS expanded the scope of their AWSCompromisedKeyQuarantine policies (v2 and v3) to include new actions. This policy is used...

Sysdig Threat Research Team – Black Hat 2024

Blog

The Sysdig Threat Research Team (TRT)  is on a mission to help secure innovation at cloud speeds. A group of...

AWS recognizes Sysdig as an Amazon Linux 2023 Service Ready Partner

Blog

Read about Amazon Linux 2023 and the recognition of Sysdig security and monitoring by AWS as a part of the Amazon Web Services (AWS) Service Ready Program.

What’s New in Sysdig – November 2023

Blog

“What’s New in Sysdig” is back with the November 2023 edition! My name is Dimitris Vassilopoulos, based in London, United...

Container security best practices: Comprehensive guide

Blog

Sticking to container security best practices is critical for successfully delivering verified software, as well as preventing severe security breaches...

1 4 5 6 7 8 10

Stay up to date! Sign up to receive our newsletter.