Sysdig Site Search
Fishing for Miners – Cryptojacking Honeypots in Kubernetes
Introduction A while back, we wrote a blog post about opening an EC2 instance to the world to see who...
Infrastructure as Code (IaC) Security
Sysdig Secure and Sysdig Inspect allow you to detect suspicious behavior and understand the attack as it happens. Learn about fishing for miners.
How to monitor OpenShift with Sysdig Monitor
Monitoring Red Hat OpenShift brings up challenges compared to a vanilla Kubernetes distribution. Discover how Sysdig Monitor, and its exclusive...
MEDIA ALERT: Sysdig to Showcase the Sysdig Secure DevOps Platform at KubeCon + CloudNativeCon 2019
Company converges security and visibility so enterprises can confidently run cloud-native workloads in productionSAN FRANCISCO, Oct. 23, 2019 – KubeCon...
Sysdig’s Falco joins the Cloud Native Computing Foundation as a CNCF Sandbox Project.
First Runtime Container Security Project joins CNCF, helping to make cloud-native architectures more secure SAN FRANCISCO, October 10, 2018 –...
How to monitor Istio, the Kubernetes service mesh
Istio service mesh allows you to add key capabilities like observability, security, and traffic management to your applications without having...
What’s New in Sysdig – July 2023
“What’s New in Sysdig” is back with the July 2023 edition! My name is Curtis Collicutt, based in Toronto, Canada,...
Introducing Sysdig Teams: Service-based access control for simpler and more secure Kubernetes & Docker monitoring
Like everyone these days, DevOps teams and developers are deluged with data. Making sense of it all is increasingly hard,...
How to monitor Istio with Sysdig
In this previous article, we talked about how to monitor the Istio service mesh in Kubernetes with the out-of-the-box observability...
Falco in the open
One of the most successful aspects of Kubernetes is how functional the open source community was able to operate. Kubernetes...