background graphic

Sysdig Site Search

Showing 991-1000 of 1005

Cloud Threats Deploying Crypto CDN

Blog

The Sysdig Threat Research Team (TRT) discovered a malicious campaign using the blockchain-based Meson service to reap rewards ahead of...

Strengthening Cyberattack Preparedness Through Identity Threat Detection and Response (ITDR)

webinars

This webinar delves into how the adaptable plugin architecture of the open-source Falco empowers security responders to expand their system call event detection capabilities to encompass auditing events originating from identity systems like Okta.

Terraform Security Best Practices

Blog

Terraform is the de facto tool if you work with infrastructure as code (IaC). Regardless of the resource provider, it...

A Hacker’s Secrets to Ethically Cracking the Code in Today’s Digital World with Dr. Charlie Miller

webinars

Join us for a fireside chat with renowned ‘White Hat’ hacker, Dr. Charlie Miller. He will share details about his own behind-the-scenes journeys and how hackers exploit vulnerabilities and why corporations and governments should address cybersecurity before assets—or lives—are put at risk.

Dig Deeper! Prioritize Cloud Vulnerabilities and Reduce Container Spending

webinars

Bad actors will find a way into your infrastructure whether through traditional approaches like misconfigurations and vulnerabilities; or more advanced approaches such as exploiting your supply chain, impersonating a user with stolen credentials, cloud entitlements, or other techniques. 

Sysdig 2022 Threat Report: Cloud-native threats are increasing and maturing

Blog

The first annual cloud-native threat report from Sysdig explores some of the year’s most important security topics in the cloud....

The Quiet Victories and False Promises of Machine Learning in Security

Blog

Contrary to what you might have read on the Internet, machine learning (ML) is not magic pixie dust. It’s a...

Cryptominer detection: a Machine Learning approach

Blog

Cryptominers are one of the main cloud threats today. Miner attacks are low risk, low effort, and high reward for...

How to detect the containers’ escape capabilities with Falco

Blog

Attackers use container escape techniques when they manage to control a container so the impact they can cause is much...

Breaking down firewalls with BPFDoor (no e!) – How to detect it with Falco

Blog

BPF (not eBPF), typically viewed from a defender/sysadmin’s perspective, provides easy access to network packets and the ability to take...

1 98 99 100 101

Stay up to date! Sign up to receive our newsletter.