background graphic

Sysdig Site Search

Showing 811-820 of 849

CSPM Best Practices for Multi-Cloud: Beyond Native Tools

webinars

Join Sysdig to understand the fundamentals on cloud categories and terms like CSPM, CWPP, CNAPP, etc. so you can move past the acronyms and onto implementing them as best practices.

Manage Excessive Permissions and Entitlements in AWS

webinars

Organizations often grant overly permissive privileges to users and services that are often unused. This level of access exposes you, enabling adversaries to hack into the cloud and perform malicious activity.

Automatically Prioritize Vulnerabilities Using Runtime Intelligence

webinars

Boost developer productivity by keeping them focused on packages, and not vulnerabilities.

Continuous Compliance on Azure 

webinars

Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks. 

The Threat Hunter’s Playbook: Mastering Cloud Defense Strategies

webinars

Join our 2023 Cloud Threat Report webinar where we will unravel the enigmatic world of weaponized cloud automation and expose cunning attacker tactics hiding among the clouds.

Dig Deeper! Prioritize Cloud Vulnerabilities and Reduce Container Spending

webinars

Bad actors will find a way into your infrastructure whether through traditional approaches like misconfigurations and vulnerabilities; or more advanced approaches such as exploiting your supply chain, impersonating a user with stolen credentials, cloud entitlements, or other techniques. 

How the Critical OpenSSL Vulnerability may affect Popular Container Images

Blog

The big news this week is that a new CRITICAL OpenSSL vulnerability will be announced on November 1st, 2022. Critical-severity...

Protecting Against Log4j Attacks in AWS Fargate

webinars

Join us for a live demo of a Log4j attack on a Fargate task and how to detect it in real-time! We'll share best practices around detection and mitigation of the log4j vulnerability running in serverless environments.

A Hacker’s Secrets to Ethically Cracking the Code in Today’s Digital World with Dr. Charlie Miller

webinars

Join us for a fireside chat with renowned ‘White Hat’ hacker, Dr. Charlie Miller. He will share details about his own behind-the-scenes journeys and how hackers exploit vulnerabilities and why corporations and governments should address cybersecurity before assets—or lives—are put at risk.

NIST 800-53 Compliance for Containers and Cloud

guides

NIST 800-53 represents a comprehensive set of controls broken down according to families, major controls, and sub controls. Many of these controls are interdependent and rely on adherence with one to impact others. With 800-53, organizations are able to work according to FedRAMP regulations, which keeps them operational at both a technology and business level.

1 80 81 82 83 84 85

Stay up to date! Sign up to receive our newsletter.