Sysdig Site Search
From Air Force to Sysdig: A Career in Cybersecurity
Growing up as a small-town science nerd with a goal of solving crimes, never in a million years did I...
The Sysdig Cloud Attack Graph – Accelerating Cloud Native Application Protection Platform (CNAPP)
The Rapidly Evolving Cloud Attack Attackers are increasing their focus on the growing cloud playing field as it becomes more...
How to detect TOR network connections with Falco
TOR was created with the idea of anonymizing connections across the Internet, but as in other instances, this can be...
Sysdig Monitor fall 2017 release
The amount of new releases, events, and products coming from our team in the last few months is almost unbelievable....
How to mitigate CVE-2021-33909 Sequoia with Falco – Linux filesystem privilege escalation vulnerability
The CVE-2021-33909, named Sequoia, is a new privilege escalation vulnerability that affects Linux’s file system. It was disclosed in July,...
Sysdig Monitor spring 2016 release
We’re really excited to round up all the great functionality we’ve released so far this year on Sysdig Monitor into...
Should you put all your trust in the tools?
My father worked with some of the very first computers ever imported to Italy. It was a time when a...
Sysdig Introduces the First Cloud-Scale Prometheus Monitoring Offering
Today, we are excited to announce a huge step forward for Sysdig Monitor. We’re introducing the ability for our customers...
CVE-2023-38545: High Severity cURL Vulnerability Detection
On Oct. 11, a new version of curl (8.4.0) was released where a couple of new vulnerabilities were fixed (CVE-2023-38545...
CVSS Version 4.0: What’s New
Over the last decade, many vulnerabilities were initially perceived as critical or high but later deemed less important due to...