Sysdig Site Search
Making sense of Meltdown/Spectre
The IT world was put on its heels this past week as two of the most significant hardware exploits were...
Falco Threat Detection Extends to gVisor to Monitor Highly Sensitive Workloads
gVisor users can now run Falco for increased security and alerting of container workloads SAN FRANCISCO — September 15, 2022...
Prioritize Alerts and Findings with Sysdig Secure
If you work in Security or Operations, you are surely familiar with the concept of “alert fatigue.” Alert fatigue Syndrome...
AWS Security Groups Guide
AWS Security Groups (and Network ACLs and VPCs) are some of the fundamental building blocks of security in your cloud...
Cloud DNS Security – How to protect DNS in the Cloud
When using DNS in the Cloud, security cannot be overlooked. This article is for cloud architects and security practitioners who...
Hunting malware with Amazon GuardDuty and Sysdig
Read how Amazon GuardDuty Malware Protection works and how Sysdig can utilize these insights inside of Sysdig Secure to provide important security information.
How to Secure Amazon EC2 with Sysdig
Elastic Compute Cloud (EC2) is arguably one of the most popular AWS services, and really needs no introduction but here...
Building on Sysdig’s Open Source Foundation
I want to take this opportunity to say hello! Earlier today, Sysdig announced that I have joined Sysdig, as VP...
Sysdig Announces Risk Spotlight to Prioritize Vulnerabilities Based on Runtime Intelligence
Sysdig Secure reduces vulnerability alerts by 95%, allowing developers to focus on shipping applications faster SAN FRANCISCO — April 20,...
Will the Cloud Kill Security Agents?
The “agents or no agents” debate is ancient and eternal. Every decade or so, we go through another round of...