Sysdig Site Search
Falco vs. AuditD from the HIDS perspective
In this blog, we will compare and contrast Falco vs. AuditD from a Host Intrusion Detection (HIDS) perspective. AuditD is...
Sysdig Doubles Down on Open Source Commitment
Sysdig today announced Dan “Pop” Papandrea as Lead of Open Source Community and Ecosystem at Sysdig. Pop will be responsible for growing adoption and contributions for open source projects created by Sysdig, including Falco.
New and improved dashboards: PromQL, Teams sharing, and more!
To accompany Sysdig’s announcement of the first cloud-scale Prometheus monitoring offering, we had to re-architect our dashboarding experience from the...
Expanding the IBM & Sysdig relationship to manage cloud security risk
Today, we are pleased to announce the expansion of Sysdig’s relationship with IBM to extend cloud security governance with IBM...
Sysdig Scales to Meet Cloud Security Demand with an Expansion to the Executive Team
Company appoints two industry veterans as engineering vice presidents SAN FRANCISCO – April 14, 2020 — Sysdig, Inc., the secure...
Sysdig Launches PromCat, Saves Developers A Week Per Integration
Industry’s first repository for vetted Prometheus integrations with documentation, configurations, and support SAN FRANCISCO — March 24, 2020 — Sysdig,...
Sysdig Partners with In-Q-Tel to Provide Unified Visibility and Security Platform to U.S. Government Agencies.
Together Sysdig and IQT to provide insight and control for agencies transitioning to modern IT architectures, including Kubernetes, containers, and multi-cloud deployments. May 13, 2019.
Sysdig Joins New AWS Marketplace for Containers and Achieves Amazon Web Services Container Competency Status.
Sysdig solutions help enterprises monitor and secure cloud-native applications. November 27, 2018.
Detecting CVE-2025-22224 with Falco
The Shadowserver group recently identified over 41,500 internet-exposed VMware ESXi hypervisors vulnerable to CVE-2025-22224, a critical Time-of-Check Time-of-Use (TOCTOU) code...
Introducing Sysdig and Torq – amplify SOC efficiency via automated cloud detection and response
Attackers born in the cloud Cloud attackers are swift and sophisticated, requiring robust threat detection and response programs that can...