Sysdig Site Search
A Hacker’s Secrets to Ethically Cracking the Code in Today’s Digital World with Dr. Charlie Miller
Join us for a fireside chat with renowned ‘White Hat’ hacker, Dr. Charlie Miller. He will share details about his own behind-the-scenes journeys and how hackers exploit vulnerabilities and why corporations and governments should address cybersecurity before assets—or lives—are put at risk.
Dig Deeper! Prioritize Cloud Vulnerabilities and Reduce Container Spending
Bad actors will find a way into your infrastructure whether through traditional approaches like misconfigurations and vulnerabilities; or more advanced approaches such as exploiting your supply chain, impersonating a user with stolen credentials, cloud entitlements, or other techniques.
Sysdig 2022 Threat Report: Cloud-native threats are increasing and maturing
The first annual cloud-native threat report from Sysdig explores some of the year’s most important security topics in the cloud....
The Quiet Victories and False Promises of Machine Learning in Security
Contrary to what you might have read on the Internet, machine learning (ML) is not magic pixie dust. It’s a...
Cryptominer detection: a Machine Learning approach
Cryptominers are one of the main cloud threats today. Miner attacks are low risk, low effort, and high reward for...
How to detect the containers’ escape capabilities with Falco
Attackers use container escape techniques when they manage to control a container so the impact they can cause is much...
Breaking down firewalls with BPFDoor (no e!) – How to detect it with Falco
BPF (not eBPF), typically viewed from a defender/sysadmin’s perspective, provides easy access to network packets and the ability to take...
Eliminate noise and prioritize the vulnerabilities that really matter with Risk Spotlight
Is your team drowning in container vulnerability noise? Are you spending a lot of time figuring out where to focus...
Are vulnerability scores misleading you? Understanding CVSS score
Vulnerabilities are everywhere. Vetting, mitigating, and remediating them at scale is exhausting for security practitioners. Let’s keep in mind that...
Zero Trust Security for OpenShift and Hybrid Cloud
The constant risk of security breaches is driving DevOps and cloud teams to embrace a Zero Trust approach to security. It’s critical to lock down your environment, but at the same time, you don’t want to break existing applications and workflows.