Sysdig Site Search
Write Prometheus queries faster with our new PromQL Explorer
We are announcing the new PromQL Explorer for Sysdig Monitor that will help you easily understand your monitor data. The...
Detecting MITRE ATT&CK: Defense evasion techniques with Falco
The defense evasion category inside MITRE ATT&CK covers several techniques an attacker can use to avoid getting caught. Familiarizing yourself...
How to detect sudo’s CVE-2021-3156 using Falco
A recent privilege escalation heap overflow vulnerability (CVSS 7.8), CVE-2021-3156, has been found in sudo. sudo is a powerful utility...
Sysdig extends image scanning to Google Cloud’s Artifact Registry
In support of modern application development built on CI/CD, containers and open source, Google Cloud launched Artifact Registry (now generally...
Sysdig Secure DevOps Platform available on Red Hat Marketplace
Sysdig is pleased to announce that the Sysdig Secure DevOps Platform is now available through Red Hat Marketplace. The New...
Improving the Prometheus exporter for Amazon CloudWatch
A Prometheus CloudWatch exporter is a key element for anyone wanting to monitor AWS CloudWatch. Exporting CloudWatch metrics to a...
How to detect CVE-2019-14287 using Falco
A recent flaw, CVE-2019-14287, has been found in sudo. In this blogpost, we are going to show you how to...
The Twistlock Acquisition: An Analysis of Palo Alto Network’s strategy.
Congratulations Twistlock! One of the best signs of an emerging market is when existing, massive players are willing to put...
Monitoring Java applications: Memory usage, threads and other JRE metrics
Intro In this post we will cover how to monitor the Java Runtime Environment (JRE). You will learn how to...
Top 5 features to look for in a cloud detection and response solution
Modern enterprise environments come in a variety of flavors across public and private cloud and on-premises infrastructure. Attackers are keen...