background graphic

Sysdig Site Search

Showing 1461-1470 of 1480

AWS Fargate Checklist

guides

As the number of container images, versions, and builds proliferates, you lose control of what software is being used and whether software updates are applied. Embedding security into your delivery pipeline as you build applications helps you identify and address vulnerabilities faster, and keeps your developers productive.

What’s new in Kubernetes 1.17?

Blog

Kubernetes 1.17 is about to be released! This short-cycle release is focused on small improvements and house cleaning. There are...

Instructor Led Training

webinars

We will guide you through how to Enhance your security by effectively detecting and responding to threats within your cloud-native...

Cloud Native Now (Techstrong Group)

webinars

Join us at Cloud Native Now on July 10 to learn how cloud-native technologies are revolutionizing the digital landscape in 2024.

Wireshark: Ethereal Network Analysis for the Cloud SOC

Blog

Remember Wireshark from the good old days of your IT degree or early engineering adventures? Well, guess what? It’s still...

The Hidden Economy of Open Source Software

Blog

The recent discovery of a backdoor in XZ Utils (CVE-2024-3094), a data compression utility used by a wide array of...

Combating Critical Cloud Vulnerabilities

webinars

Join this 45-minute working session to evaluate the maturity of your cloud-native infrastructure and learn about how you can begin combating critical cloud vulnerabilities today

SANS CyberFest

webinars

Join us at CyberFest for a major announcement about cloud security benchmarks. Join us for our keynote, Cloud Security Accelerated: Does Your Threat Detection Measure Up?

Aligning Falco’s Cloudtrail Rules with MITRE ATT&CK

Blog

This blog will explain how Falco’s Cloudtrail plugin rules can be aligned with MITRE ATT&CK Framework for Cloud.  One important...

1 145 146 147 148

Stay up to date! Sign up to receive our newsletter.