background graphic

Sysdig Site Search

Showing 951-960 of 1012

Becoming a Cloud Security Ninja: Slice Through Alerts and Prioritize What Matters

webinars

Join Sysdig, who’s driving the standard for cloud and container security, alongside Tag Cyber, for a discussion around cloud security best practices, tips, and recommendations.

Becoming a Cloud Security Ninja: Sharpen your Cloud Threat Detection Sword with Machine Learning

webinars

Cybercriminals have been developing their skills and attack techniques to expand into cloud and container workloads. How do your security teams defend the cloud infrastructure against an evolving threat landscape?

How to Improve Security for Cloud-Native App Platforms in 3 Easy Steps for Azure

webinars

All the cloud providers (including Microsoft Azure) have default controls suggested to secure your infrastructure. We at Sysdig believe in leveraging these and going beyond by following additional steps.

5 Easy Ways to Secure Images & Prioritize Risk from Source to Run On AWS

webinars

Do you want to ensure images are free of vulnerabilities and meet best practices before pushing to production? Participants will learn how Sysdig Secure can identify vulnerabilities pre-production and at runtime.

Becoming a Cloud Security Ninja: Sharpen Your SBOM and Protect Your Software Supply Chain

webinars

We have recently seen a huge increase in software supply chain attacks, leading to additional compliance requirements for software providers. We also hear a lot of new terms (SBOM, VEX, CSAF, etc) and standards popping up from different vendors and organizations. How do you keep up with this acronym soup?

5 Attack Tactics to Guard against using MITRE ATT&CK for AWS

webinars

How can you pull together a unified and simple approach to speed up detection and response for security across your AWS cloud workloads?

Finding Suspicious Events with AWS CloudTrail: Fundamentals and Best Practices

webinars

You see the headlines, and think, “thank goodness it wasn’t us”. An overly permissive web server exposes 100 million+ consumer credit applications in an S3 bucket, leaving hundreds of millions of user records open to the public.

A Comprehensive Approach to Cloud Threat Detection and Response

whitepapers

In this paper, we make a strong case that organizations need both agent-based and agentless monitoring solutions to maximize visibility and control.

FIND, FOCUS, and FIX the Cloud Threats that Matter Solutions Forum

webinars

Join Sysdig, who’s driving the standard for cloud and container security, alongside other industry experts, customers, and partners - for an insightful exchange of cloud security best practices, tips, and recommendations.

A Comprehensive Approach to Cloud Threat Detection and Response

webinars

In this webinar, SANS Sr. Instructor Jake Williams and Mike Isbitski, Director of Cybersecurity Strategy, Sysdig, make the case for implementing a combination of agent-based and agentless cloud-native security tooling, an approach that provides outcomes far superior than either solution on its own.

1 94 95 96 97 98 102

Stay up to date! Sign up to receive our newsletter.