Sysdig Site Search
The Quiet Victories and False Promises of Machine Learning in Security
Contrary to what you might have read on the Internet, machine learning (ML) is not magic pixie dust. It’s a...
Cryptominer detection: a Machine Learning approach
Cryptominers are one of the main cloud threats today. Miner attacks are low risk, low effort, and high reward for...
How to detect the containers’ escape capabilities with Falco
Attackers use container escape techniques when they manage to control a container so the impact they can cause is much...
Breaking down firewalls with BPFDoor (no e!) – How to detect it with Falco
BPF (not eBPF), typically viewed from a defender/sysadmin’s perspective, provides easy access to network packets and the ability to take...
Eliminate noise and prioritize the vulnerabilities that really matter with Risk Spotlight
Is your team drowning in container vulnerability noise? Are you spending a lot of time figuring out where to focus...
Are vulnerability scores misleading you? Understanding CVSS score
Vulnerabilities are everywhere. Vetting, mitigating, and remediating them at scale is exhausting for security practitioners. Let’s keep in mind that...
Zero Trust Security for OpenShift and Hybrid Cloud
The constant risk of security breaches is driving DevOps and cloud teams to embrace a Zero Trust approach to security. It’s critical to lock down your environment, but at the same time, you don’t want to break existing applications and workflows.
Secure DevOps Best Practices for Multicloud Environments
Multicloud is inevitable. In fact, it’s likely you’re already using different clouds like AWS, Google Cloud, and Azure for various functions. But, how do you address risk and ensure proper security practices across all of your cloud accounts and deployments?
Sysdig and PagerDuty: a Superior Alerting Experience
One of the most common ways that users interact with Sysdig (and all monitoring tools, really) is through alerts. You...