Sysdig Site Search
What’s new in Sysdig — April 2025
Sysdig enters a major new chapter this month with full native support for Windows environments, a strategic unification of core...
Sysdig Usage Report Reveals that Machine Identities Outnumber Humans 40,000 to 1, Presenting a Major Challenge to Enterprise Security
Cloud defenders are gaining ground as the cloud landscape comes into focus, with 92% of organizations operating without risky human...
NTT DOCOMO Relies on Sysdig to Secure 80+ Million Users
NTT DOCOMO secured GKE with Sysdig, boosting compliance and response times across infrastructure serving 80M+.
Ben Visa Vale Protects 800K Cardholders
Ben Visa Vale uses Sysdig to cut vuln management time by 70% and reduce prod vulns by 98% across AWS and EKS.
Sysdig Named Leader and Outperformer in GigaOm Radar for Container Security
Containers have revolutionized development in the cloud, allowing dev teams to work with unprecedented speed, efficiency, and scale. But securing...
Apree Health Partners with Sysdig to Gain Container Visibility and Meet Compliance
Apree Health used Sysdig to streamline HITRUST/SOC 2 audits, cutting remediation time by 80% on Google Cloud.
Kernel introspection from Linux to Windows
The cybersecurity landscape is undergoing a significant shift, moving from security tools monitoring applications running within userspace to advanced, real-time...
Dynamic Docker Topology Mapping
With Sysdig you can create a dynamic topology map of your container infrastructure.
Proxyjacking has Entered the Chat
Did you know that you can effortlessly make a small passive income by simply letting an application run on your...
Getting Started Writing Falco Rules
Sysdig’s Falco is a powerful behavioral activity monitoring tool to detect abnormal behavior in your applications and containers. While it...