Sysdig Site Search
CVE-2022-0847: “Dirty Pipe” Linux Local Privilege Escalation
Right on the heels of CVE-2022-4092, another local privilege escalation flaw in the Linux Kernel was disclosed on Monday, nicknamed...
Continuous Compliance on Azure
Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks.
Exploiting, Mitigating, and Detecting CVE-2021-44228: Log4j Remote Code Execution (RCE)
A new critical vulnerability has been found in log4j, a widely-used open-source utility used to generate logs inside java applications....
Threat news: Tsunami malware mutated. Now targeting Jenkins and Weblogic services
The Tsunami malware is back! Although it appeared for the first time several years ago, the Sysdig Research Team has...
5 best practices for securing AWS cloud and containers
Learn how to automate efficient security and compliance controls in Amazon Web Services (AWS). Secure and accelerate your cloud innovation on AWS with five best practices for cloud and container security.
NIST 800-190 Application Security Guide Checklist
Read the NIST Application Security Guide where we show you how to go a step beyond the recommendations from the NIST SP 800-190 application container security publication. This is a checklist of the practical steps and controls you can take to comply with NIST recommendations using Sysdig.
Introducing the Sysdig Cloud metrics dictionary
Metrics monitoring is incredibly powerful, but only if you know what those metrics actually mean! To make it simpler on...
RSI Eliminates Noise and Ensures Compliance Excellence with Sysdig
RSI doubled security team productivity and achieved 100% coverage in 6 weeks with Sysdig’s CNAPP platform.
The evolution of vulnerability scanning
As application development and deployment evolve, traditional tools alone can no longer handle the dynamic, ephemeral nature of cloud and...
A CISO’s grimoire for outsmarting attackers
For security leaders, staying vigilant and prepared is like wielding a well-crafted spellbook. OWASP, MITRE ATT&CK, and threat research are...