Sysdig Site Search
Threat news: TeamTNT stealing credentials using EC2 Instance Metadata
The Sysdig Threat Research Team has detected an attack that can be attributed to the TeamTNT. The initial target was...
Sysdig and Apolicy join forces to help customers secure Infrastructure As Code and automate remediation
Today, we announced that Sysdig is acquiring Apolicy to enable our customers to secure their infrastructure as code. I could...
How to monitor Ceph: the top 5 metrics to watch
Now that we’re up and running, we need to talk about how to monitor Ceph. Monitoring and troubleshooting your Ceph storage infrastructure is as important - and arguably more important - as monitoring the containers that your apps run in.
Top 9 file integrity monitoring (FIM) best practices
Discover how applying a quick set of file integrity monitoring best practices will help you detect the tampering of critical...
Cloud Security Posture Management (CSPM)
TeamTNT malware targeted a Kubernetes Pod and attempted to steal AWS credentials using the EC2 instance metadata.
Introducing Falco Feeds by Sysdig
The cybersecurity landscape is sadly brimming with tools that address narrow, specific problems, leading to a phenomenon known as “Point...
Contact Us (SEM)
TeamTNT malware targeted a Kubernetes Pod and attempted to steal AWS credentials using the EC2 instance metadata.
Cloud Detection and Response (CDR)
TeamTNT malware targeted a Kubernetes Pod and attempted to steal AWS credentials using the EC2 instance metadata.
Unmatched coverage for cloud and hybrid workloads: Meet Sysdig’s next generation instrumentation
In today’s rapidly changing and evolving cloud-native environments, security and infrastructure teams face challenges ranging from managing complex deployments to...
Ecosystem
Sysdig integrates with the cloud, container, and Kubernetes tools and platforms you use to modernize your workloads in the cloud.