background graphic

Sysdig Site Search

Showing 951-960 of 1005

Becoming a Cloud Security Ninja: Sharpen Your SBOM and Protect Your Software Supply Chain

webinars

We have recently seen a huge increase in software supply chain attacks, leading to additional compliance requirements for software providers. We also hear a lot of new terms (SBOM, VEX, CSAF, etc) and standards popping up from different vendors and organizations. How do you keep up with this acronym soup?

5 Attack Tactics to Guard against using MITRE ATT&CK for AWS

webinars

How can you pull together a unified and simple approach to speed up detection and response for security across your AWS cloud workloads?

Finding Suspicious Events with AWS CloudTrail: Fundamentals and Best Practices

webinars

You see the headlines, and think, “thank goodness it wasn’t us”. An overly permissive web server exposes 100 million+ consumer credit applications in an S3 bucket, leaving hundreds of millions of user records open to the public.

A Comprehensive Approach to Cloud Threat Detection and Response

whitepapers

In this paper, we make a strong case that organizations need both agent-based and agentless monitoring solutions to maximize visibility and control.

FIND, FOCUS, and FIX the Cloud Threats that Matter Solutions Forum

webinars

Join Sysdig, who’s driving the standard for cloud and container security, alongside other industry experts, customers, and partners - for an insightful exchange of cloud security best practices, tips, and recommendations.

A Comprehensive Approach to Cloud Threat Detection and Response

webinars

In this webinar, SANS Sr. Instructor Jake Williams and Mike Isbitski, Director of Cybersecurity Strategy, Sysdig, make the case for implementing a combination of agent-based and agentless cloud-native security tooling, an approach that provides outcomes far superior than either solution on its own.

CSPM Best Practices for Multi-Cloud: Beyond Native Tools

webinars

Join Sysdig to understand the fundamentals on cloud categories and terms like CSPM, CWPP, CNAPP, etc. so you can move past the acronyms and onto implementing them as best practices.

Snyk & Sysdig Solution Brief

briefs

Snyk and Sysdig deliver the broadest security coverage for cloud-native application development and delivery while helping teams reduce noise and risk.

Sysdig Platform Architecture Guide

whitepapers

The Sysdig Secure DevOps platform embeds security, compliance, and monitoring into your DevOps workflow. It is the only unified container security and monitoring platform.

Scale up Threat Detection, Scale Down False Positives in the Cloud

webinars

The cloud vendors offer hundreds of cloud services your team may be using. How can you identify threats across these services without drowning in a sea of alerts? Join us to learn how to scale up threat detection and scale down false positives in the cloud.

1 94 95 96 97 98 101

Stay up to date! Sign up to receive our newsletter.