background graphic

Sysdig Site Search

Showing 701-710 of 846

Strengthening Cyberattack Preparedness Through Identity Threat Detection and Response (ITDR)

webinars

This webinar delves into how the adaptable plugin architecture of the open-source Falco empowers security responders to expand their system call event detection capabilities to encompass auditing events originating from identity systems like Okta.

How to Detect and Respond to Threats Lurking in your GKE Workloads

webinars

The cloud-native landscape is riddled with stories of security breaches. Do you know what’s happening inside your containers on GKE?

CIS compliance for Azure

webinars

Sysdig performs threat detection for Microsoft Azure by analyzing this log data against a rich set of security rules based on open-source Falco.

Sysdig a Leader in Frost Radar, CNAPP 2022

Blog

Frost & Sullivan has named Sysdig a Leader in its recent research, Frost Radar™: Cloud-Native Application Protection Platforms (CNAPP). The...

In search of 0xffffffffff600400: troubleshooting containers, system calls and performance

Blog

This article describes an issue caused by a Linux container image running on a “mismatched” Linux kernel version. The exploration...

CrashLoopBackoff + Four Other K8s Troubleshooting Tips Everyone Should Know

webinars

In this webinar, we will cover some of the common problems that plague every Kubernetes user and show you how to fix them. We will explain why they happen and share some best practices that will make your life easier in the future.

Exploiting, Mitigating, and Detecting CVE-2021-44228: Log4j Remote Code Execution (RCE)

Blog

A new critical vulnerability has been found in log4j, a widely-used open-source utility used to generate logs inside java applications....

Falco Support on AWS Fargate

Blog

Today we’re very excited to announce a partnership with Amazon to support Fargate in Sysdig’s product line. We are also...

Reduce Alerts and False Positives – Monitor Golden Signals using Sysdig

webinars

In this deminar, we will cover why golden signals are important for modern distributed systems, how to monitor and set up alerts for Kubernetes applications using Sysdig.

A Comprehensive Approach to Cloud Threat Detection and Response

webinars

In this webinar, SANS Sr. Instructor Jake Williams and Mike Isbitski, Director of Cybersecurity Strategy, Sysdig, make the case for implementing a combination of agent-based and agentless cloud-native security tooling, an approach that provides outcomes far superior than either solution on its own.

1 69 70 71 72 73 85

Stay up to date! Sign up to receive our newsletter.