background graphic

Sysdig Site Search

Showing 371-380 of 1012

Sysdig Named a Leader in Container Security and Observability by Independent Research Firm

press releases

Report states that the unified security and monitoring approach “is appealing to enterprises seeking to streamline their understanding and protection...

Sysdig Achieves AWS Outposts Ready Designation

press releases

Sysdig allows organizations to embed security and monitoring into a secure DevOps workflow across hybrid cloud environments SAN FRANCISCO –...

Securing Tekton pipelines in OpenShift with Sysdig

Blog

In this blog post, you’ll learn how to create a reusable Sysdig Secure image scanning task, for Tekton pipelines and...

The Datadog IPO: An Analysis of Datadog’s Future.

Blog

First, congratulations to Datadog for building a strong business and its IPO today! Datadog’s rapid growth illustrates a couple of...

Generative AI

page

Stop attacks faster and work smarter with Sysdig Sage AI-powered cloud security

Threat Research

page

Sysdig was named a leader in security and observability by Information Services Group (ISG), a leading global technology research and advisory firm.

Stratoshark

page

Sysdig was named a leader in security and observability by Information Services Group (ISG), a leading global technology research and advisory firm.

Cybersecurity Strategy Must Include Both Shift-Left and Shield-Right Approaches

whitepapers

Cyber attacks are an unfortunate reality in our interconnected world. The art of keeping up with malicious actors is challenging, but even more so with the move to cloud-native technologies. As a result, security is evolving. Developers, DevOps, and cloud teams must now learn a new set of best practices that balance shift-left security and shield-right security approaches to reduce risk. This white paper developed in collaboration with our partner, Snyk, the leader in developer security, describe the underpinnings of modern cybersecurity programs in the world of containers, Kubernetes, and cloud.

Reduce Alerts and False Positives – Monitor Golden Signals using Sysdig

webinars

In this deminar, we will cover why golden signals are important for modern distributed systems, how to monitor and set up alerts for Kubernetes applications using Sysdig.

Preventing malicious use of Weave Scope

Blog

Intezer and Microsoft reported on Sept. 9 that TeamTNT hackers are deploying Weave Scope in compromised systems as an auxiliary...

1 36 37 38 39 40 102

Stay up to date! Sign up to receive our newsletter.