Sysdig Site Search
2018 Docker usage report
Our 2nd annual Docker Usage Report provides insight into real-world customer container deployments over the past year. Read about increasing densities, diversity in container runtimes, and details on what's happening with orchestrators like Kubernetes.
Guide to OWASP Top 10 for Kubernetes
This guide on OWASP Top 10 for Kubernetes provides valuable information and best practices beyond the original OWASP guidance, and that applies broadly to most Kubernetes environments.
Sysdig Enhances its Cloud-Native Intelligence Platform with NIST 800-190 and PCI Compliance Capabilities for Kubernetes and OpenShift Environments.
Helping enterprises transition to containers, reduce security risk, and improve DevOps efficiency. RSA CONFERENCE - March 5, 2019.
Monitoring and securing Kubernetes-based healthcare services on Google Cloud: Cota Healthcare
As Cota Healthcare moved to Kubernetes on Google Cloud, it chose Sysdig for Kubernetes monitoring and container security. With Sysdig,...
Mitigating log4j with Runtime-based Kubernetes Network Policies
A critical vulnerability, CVE-2021-44228 known as “log4shell,” in Apache’s log4j was revealed on December 10th, 2021, and has already seen...
Sysdig Hires Kubernetes Expert to Lead Open Source Team as Falco Adoption Increases 240% Over the Last Nine Months.
Kris Nova named as new Chief Open Source Advocate as Sysdig continues focus on providing visibility and security into Kubernetes...
Sysdig Secure 1.5 – enhanced kubernetes security & compliance; integrates with Google Cloud.
The Sysdig Secure 1.5 release furthers our goal of unifying security, performance monitoring, and forensics. This release includes a new...
How to Secure Kubernetes, the OS of the Cloud
As infrastructures and workloads transition to cloud and teams adopt a CI/CD development process, there is a new paradigm shift:...
Sysdig cuts onboarding for container and Kubernetes visibility and security to 5 minutes
Today, we are excited to announce a faster onboarding for Kubernetes visibility and security. With the SaaS-first approach and new...
Kubernetes network segmentation using native controls
Network segmentation is almost as old as computer networking. The evolution of network segmentation went through switches to routers and...