Sysdig Site Search
Collect critical AWS metrics faster with Sysdig
Today, we are excited to announce support for Amazon CloudWatch Metric Streams. This support will enable our customers to ingest...
DevOps GDPR Compliance: The “Spark Notes” edition
The upcoming enforcement of the European General Data Protection Regulation (GDPR) means that more likely than not your organization probably...
Crack the Exam Code to Become a Certified K8s Security Specialist (CKS)! Tips and Tricks to Prepare with Saiyam Pathak, CNCF Ambassador and Daniel Lemos, CKS
To help you crack the code to pass this exam, join Saiyam Pathak, CNCF Ambassador and Sydig’s most recent CKS, Daniel Lemos in a discussion about what it was really like to take the exam and pass, what worked and what would have helped in passing.
How to detect TOR network connections with Falco
TOR was created with the idea of anonymizing connections across the Internet, but as in other instances, this can be...
Shifting Security Further Left with IaC Security
Modern DevOps teams are adopting GitOps principles: provisioning workloads using infrastructure-as-code (IaC) tools and managing policies as code using open source tools like Open Policy Agent (OPA)
Sysdig achieves AWS DevSecOps specialization within AWS DevOps Competency
Sysdig is pleased to announce that it has achieved Amazon Web Services (AWS) DevOps Competency for development, security, and operations...
Detect malicious activity in Okta logs with Falco and Sysdig okta-analyzer
On March 22, the hacking group Lapsus$ published a Twitter post with a number of screenshots taken from a computer...
Containerized AppSec from Code to Production w/ Snyk, Sysdig and AWS
Snyk and Sysdig have partnered to help developers and security teams easily find and fix open source and container vulnerabilities in development, then analyze running workloads in production to identify vulnerable packages executed at runtime.
Triaging a Malicious Docker Container
Malicious Docker containers are a relatively new form of attack, taking advantage of an exposed Docker API or vulnerable host...
Secure Containers and Eliminate Noise from Code to Production with Sysdig and Snyk
Drowning in noise from container security alerts? To silence this problem, developer, DevOps, and SecOps teams need a strategy that will bridge the gap between code development, platform operations, and security controls.