background graphic

Sysdig Site Search

Showing 891-900 of 1012

Manage Excessive Permissions and Entitlements in AWS

webinars

Organizations often grant overly permissive privileges to users and services that are often unused. This level of access exposes you, enabling adversaries to hack into the cloud and perform malicious activity.

Automatically Prioritize Vulnerabilities Using Runtime Intelligence

webinars

Boost developer productivity by keeping them focused on packages, and not vulnerabilities.

Wie man sich auf die nächste log4j vorbereiten kann

webinars

Als neue kritische Schwachstellen in log4j, dem beliebten Open-Source-Utility zur Erzeugung von Logs in Java-Anwendungen, gefunden wurde, war schnelles Handeln gefragt.

Bereid je voor op de volgende log4j!

webinars

Bereid u voor op de volgende log4j door samen met Marcel Claassen van ons Solution Engineering-team te leren hoe u kunt bepalen of uw systemen zijn getroffen & hoe u zich kunt beschermen met mitigerende maatregelen.

How to Prepare for the Next Log4j

webinars

Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks. 

Protecting Against Log4j Attacks in AWS Fargate

webinars

Join us for a live demo of a Log4j attack on a Fargate task and how to detect it in real-time! We'll share best practices around detection and mitigation of the log4j vulnerability running in serverless environments.

Securing Serverless Containers on AWS Fargate

webinars

Join us to hear how Sysdig uniquely solves the serverless visibility challenge so you can confidently secure AWS Fargate serverless containers at scale.

Image Scanning on Azure

webinars

Do you want to ensure images are free of vulnerabilities and meet best practices before pushing to production? Image scanning refers to the process of analyzing the contents and the build process of a container image in order to detect security issues, vulnerabilities, or bad practices. Participants will learn how Sysdig Secure can identify vulnerabilities pre-production and at runtime.

Continuous Compliance on AWS

webinars

Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks. 

NIST 800-53 Compliance for Containers and Cloud

guides

NIST 800-53 represents a comprehensive set of controls broken down according to families, major controls, and sub controls. Many of these controls are interdependent and rely on adherence with one to impact others. With 800-53, organizations are able to work according to FedRAMP regulations, which keeps them operational at both a technology and business level.

1 88 89 90 91 92 102

Stay up to date! Sign up to receive our newsletter.