background graphic

Sysdig Site Search

Showing 881-890 of 1005

How to Detect and Respond to Threats Lurking in your GKE Workloads

webinars

The cloud-native landscape is riddled with stories of security breaches. Do you know what’s happening inside your containers on GKE?

Securing the DevSecOps Pipeline with Shift Left + Runtime Security

webinars

Modern DevOps teams are adopting GitOps principles: provisioning workloads using infrastructure-as-code (IaC) tools and managing policies as code using open source tools like Open Policy Agent (OPA)

Securing Serverless Containers on AWS Fargate

webinars

Join us to hear how Sysdig uniquely solves the serverless visibility challenge so you can confidently secure AWS Fargate serverless containers at scale.

How to be Compliant with Mandates from SOC2, PCI, NIST etc. for your AWS Cloud infrastructure

webinars

Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks.

CIS compliance for Azure

webinars

Sysdig performs threat detection for Microsoft Azure by analyzing this log data against a rich set of security rules based on open-source Falco.

Manage Excessive Permissions and Entitlements in AWS

webinars

Organizations often grant overly permissive privileges to users and services that are often unused. This level of access exposes you, enabling adversaries to hack into the cloud and perform malicious activity.

Automatically Prioritize Vulnerabilities Using Runtime Intelligence

webinars

Boost developer productivity by keeping them focused on packages, and not vulnerabilities.

Wie man sich auf die nächste log4j vorbereiten kann

webinars

Als neue kritische Schwachstellen in log4j, dem beliebten Open-Source-Utility zur Erzeugung von Logs in Java-Anwendungen, gefunden wurde, war schnelles Handeln gefragt.

Bereid je voor op de volgende log4j!

webinars

Bereid u voor op de volgende log4j door samen met Marcel Claassen van ons Solution Engineering-team te leren hoe u kunt bepalen of uw systemen zijn getroffen & hoe u zich kunt beschermen met mitigerende maatregelen.

How to Prepare for the Next Log4j

webinars

Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks. 

1 87 88 89 90 91 101

Stay up to date! Sign up to receive our newsletter.