background graphic

Sysdig Site Search

Showing 1001-1010 of 1013

A Hacker’s Secrets to Ethically Cracking the Code in Today’s Digital World with Dr. Charlie Miller

webinars

Join us for a fireside chat with renowned ‘White Hat’ hacker, Dr. Charlie Miller. He will share details about his own behind-the-scenes journeys and how hackers exploit vulnerabilities and why corporations and governments should address cybersecurity before assets—or lives—are put at risk.

Dig Deeper! Prioritize Cloud Vulnerabilities and Reduce Container Spending

webinars

Bad actors will find a way into your infrastructure whether through traditional approaches like misconfigurations and vulnerabilities; or more advanced approaches such as exploiting your supply chain, impersonating a user with stolen credentials, cloud entitlements, or other techniques. 

Sysdig 2022 Threat Report: Cloud-native threats are increasing and maturing

Blog

The first annual cloud-native threat report from Sysdig explores some of the year’s most important security topics in the cloud....

The Quiet Victories and False Promises of Machine Learning in Security

Blog

Contrary to what you might have read on the Internet, machine learning (ML) is not magic pixie dust. It’s a...

Cryptominer detection: a Machine Learning approach

Blog

Cryptominers are one of the main cloud threats today. Miner attacks are low risk, low effort, and high reward for...

How to detect the containers’ escape capabilities with Falco

Blog

Attackers use container escape techniques when they manage to control a container so the impact they can cause is much...

Breaking down firewalls with BPFDoor (no e!) – How to detect it with Falco

Blog

BPF (not eBPF), typically viewed from a defender/sysadmin’s perspective, provides easy access to network packets and the ability to take...

Eliminate noise and prioritize the vulnerabilities that really matter with Risk Spotlight

Blog

Is your team drowning in container vulnerability noise? Are you spending a lot of time figuring out where to focus...

Are vulnerability scores misleading you? Understanding CVSS score

Blog

Vulnerabilities are everywhere. Vetting, mitigating, and remediating them at scale is exhausting for security practitioners. Let’s keep in mind that...

Zero Trust Security for OpenShift and Hybrid Cloud

webinars

The constant risk of security breaches is driving DevOps and cloud teams to embrace a Zero Trust approach to security. It’s critical to lock down your environment, but at the same time, you don’t want to break existing applications and workflows.

1 99 100 101 102

Stay up to date! Sign up to receive our newsletter.