background graphic

Sysdig Site Search

Showing 21-30 of 254

Comparing GuardDuty & Falco on EKS

Blog

Read about the differences between Amazon GuardDuty and Falco for Amazon EKS to better understand what each tool does, the threats detected, and the metadata available for forensic analysis.

Pod Security Policies in production with Sysdig’s Kubernetes Policy Advisor

Blog

Sysdig Secure 3.0 introduces Kubernetes Policy Advisor to provide Kubernetes native prevention using Pod Security Policies (PSPs). This feature automates...

Cloud Defense in Depth: Lessons from the Kinsing Malware

Blog

In the face of persistent data breaches and escalating cyber threats, organizations are compelled to prioritize cloud defense in depth....

GitOps Security with k8s-security-configwatch

Blog

the k8s-security-configwatch GitHub Action, an open source tool from Sysdig, secures your GitOps workloads by detecting changes on your Kubernetes...

Sysdig Addresses Risk of Excessive Permissions with Cloud Infrastructure Entitlements Management

press releases

Sysdig, Inc. announced today the addition of Cloud Infrastructure Entitlements Management (CIEM) capabilities to the Secure DevOps Platform. Taking a zero trust approach, customers get instant visibility and control over cloud permissions.

Cloud lateral movement: Breaking in through a vulnerable container

Blog

Lateral movement is a growing concern with cloud security. That is, once a piece of your cloud infrastructure is compromised,...

Aligning Falco’s Cloudtrail Rules with MITRE ATT&CK

Blog

This blog will explain how Falco’s Cloudtrail plugin rules can be aligned with MITRE ATT&CK Framework for Cloud.  One important...

Sysdig 2024 Cloud-Native Security and Usage Report

page

Sysdig, Inc. announced today the addition of Cloud Infrastructure Entitlements Management (CIEM) capabilities to the Secure DevOps Platform. Taking a zero trust approach, customers get instant visibility and control over cloud permissions.

Improving AWS security services with Sysdig Secure

Blog

Learn about AWS security services and how third-party tools like the Falco and Sysdig Secure complement Amazon offerings for complete cloud security.

Detecting cryptomining attacks “in the wild”

Blog

Cryptomining attacks are becoming more notable in-line with the rise of blockchain and cryptocurrencies, so detecting cryptomining has become a...

1 2 3 4 5 26

Stay up to date! Sign up to receive our newsletter.