Sysdig Site Search
CSPM Best Practices for Multi-Cloud: Beyond Native Tools
Join Sysdig to understand the fundamentals on cloud categories and terms like CSPM, CWPP, CNAPP, etc. so you can move past the acronyms and onto implementing them as best practices.
Manage Excessive Permissions and Entitlements in AWS
Organizations often grant overly permissive privileges to users and services that are often unused. This level of access exposes you, enabling adversaries to hack into the cloud and perform malicious activity.
Automatically Prioritize Vulnerabilities Using Runtime Intelligence
Boost developer productivity by keeping them focused on packages, and not vulnerabilities.
Continuous Compliance on Azure
Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks.
The Threat Hunter’s Playbook: Mastering Cloud Defense Strategies
Join our 2023 Cloud Threat Report webinar where we will unravel the enigmatic world of weaponized cloud automation and expose cunning attacker tactics hiding among the clouds.
Dig Deeper! Prioritize Cloud Vulnerabilities and Reduce Container Spending
Bad actors will find a way into your infrastructure whether through traditional approaches like misconfigurations and vulnerabilities; or more advanced approaches such as exploiting your supply chain, impersonating a user with stolen credentials, cloud entitlements, or other techniques.
How the Critical OpenSSL Vulnerability may affect Popular Container Images
The big news this week is that a new CRITICAL OpenSSL vulnerability will be announced on November 1st, 2022. Critical-severity...
Protecting Against Log4j Attacks in AWS Fargate
Join us for a live demo of a Log4j attack on a Fargate task and how to detect it in real-time! We'll share best practices around detection and mitigation of the log4j vulnerability running in serverless environments.
A Hacker’s Secrets to Ethically Cracking the Code in Today’s Digital World with Dr. Charlie Miller
Join us for a fireside chat with renowned ‘White Hat’ hacker, Dr. Charlie Miller. He will share details about his own behind-the-scenes journeys and how hackers exploit vulnerabilities and why corporations and governments should address cybersecurity before assets—or lives—are put at risk.
NIST 800-53 Compliance for Containers and Cloud
NIST 800-53 represents a comprehensive set of controls broken down according to families, major controls, and sub controls. Many of these controls are interdependent and rely on adherence with one to impact others. With 800-53, organizations are able to work according to FedRAMP regulations, which keeps them operational at both a technology and business level.