background graphic

Sysdig Site Search

Showing 831-840 of 1012

Collect critical AWS metrics faster with Sysdig

Blog

Today, we are excited to announce support for Amazon CloudWatch Metric Streams. This support will enable our customers to ingest...

DevOps GDPR Compliance: The “Spark Notes” edition

Blog

The upcoming enforcement of the European General Data Protection Regulation (GDPR) means that more likely than not your organization probably...

Crack the Exam Code to Become a Certified K8s Security Specialist (CKS)! Tips and Tricks to Prepare with Saiyam Pathak, CNCF Ambassador and Daniel Lemos, CKS

webinars

To help you crack the code to pass this exam, join Saiyam Pathak, CNCF Ambassador and Sydig’s most recent CKS, Daniel Lemos in a discussion about what it was really like to take the exam and pass, what worked and what would have helped in passing. 

How to detect TOR network connections with Falco

Blog

TOR was created with the idea of anonymizing connections across the Internet, but as in other instances, this can be...

Shifting Security Further Left with IaC Security

webinars

Modern DevOps teams are adopting GitOps principles: provisioning workloads using infrastructure-as-code (IaC) tools and managing policies as code using open source tools like Open Policy Agent (OPA)

Sysdig achieves AWS DevSecOps specialization within AWS DevOps Competency

Blog

Sysdig is pleased to announce that it has achieved Amazon Web Services (AWS) DevOps Competency for development, security, and operations...

Detect malicious activity in Okta logs with Falco and Sysdig okta-analyzer

Blog

On March 22, the hacking group Lapsus$ published a Twitter post with a number of screenshots taken from a computer...

Containerized AppSec from Code to Production w/ Snyk, Sysdig and AWS

webinars

Snyk and Sysdig have partnered to help developers and security teams easily find and fix open source and container vulnerabilities in development, then analyze running workloads in production to identify vulnerable packages executed at runtime.

Triaging a Malicious Docker Container

Blog

Malicious Docker containers are a relatively new form of attack, taking advantage of an exposed Docker API or vulnerable host...

Secure Containers and Eliminate Noise from Code to Production with Sysdig and Snyk

webinars

Drowning in noise from container security alerts? To silence this problem, developer, DevOps, and SecOps teams need a strategy that will bridge the gap between code development, platform operations, and security controls.

1 82 83 84 85 86 102

Stay up to date! Sign up to receive our newsletter.