Sysdig Site Search
Deploying Sysdig from the new AWS CloudFormation Public Registry
AWS CloudFormation provides an easy way to model and set up AWS resources to help you save time in deploying...
Automated Falco rule tuning
We recently released the automated Falco rule tuning feature in Sysdig Secure. Out-of-the-box security rules are a double-edged sword. On...
See your logs and metrics together with LogDNA and Sysdig integration
Observability is the key to solving problems quickly, and organizations use many tools to try to increase visibility in their...
Securing AWS Fargate workloads: Meeting File Integrity Monitoring (FIM) requirements
Securing AWS Fargate serverless workloads can be tricky as AWS does not provide much detail about the internal workings. After...
How to monitor Microsoft SQL Server with Prometheus
In this article, you will learn how to monitor SQL Server with Prometheus. SQL Server is a popular database, which...
How to detect EC2 Serial Console enabled
Recently, Amazon AWS introduced the new feature EC2 Serial Console for instances using Nitro System. It provides a simple and...
AWS CIS: Manage cloud security posture on AWS infrastructure
Implementing the AWS Foundations CIS Benchmarks will help you improve your cloud security posture in your AWS infrastructure. What entry...
SELinux, Seccomp, Sysdig Falco, and you: A technical discussion
One of the questions we often get when we talk about Sysdig Falco is How does it compare to other...
Sysdig surpasses 1M downloads
I’m proud to announce today that sysdig, the open source linux system visibility tool, has surpassed a million downloads(). I...
5 Best practices for ensuring secure container images
Most modern organizations understand that the earlier you integrate security into the development process, the more secure the applications will...