Sysdig Site Search
Pod Security Policies in production with Sysdig’s Kubernetes Policy Advisor
Sysdig Secure 3.0 introduces Kubernetes Policy Advisor to provide Kubernetes native prevention using Pod Security Policies (PSPs). This feature automates...
Cloud Defense in Depth: Lessons from the Kinsing Malware
In the face of persistent data breaches and escalating cyber threats, organizations are compelled to prioritize cloud defense in depth....
GitOps Security with k8s-security-configwatch
the k8s-security-configwatch GitHub Action, an open source tool from Sysdig, secures your GitOps workloads by detecting changes on your Kubernetes...
Cloud lateral movement: Breaking in through a vulnerable container
Lateral movement is a growing concern with cloud security. That is, once a piece of your cloud infrastructure is compromised,...
Sysdig 2024 Cloud-Native Security and Usage Report
Kubernetes Pod Security Policies provide a framework to ensure Pods run with appropriate privileges and can solely access the appropriate resources.
Aligning Falco’s Cloudtrail Rules with MITRE ATT&CK
This blog will explain how Falco’s Cloudtrail plugin rules can be aligned with MITRE ATT&CK Framework for Cloud. One important...
Sysdig 2025 Cloud-Native Security and Usage Report
Kubernetes Pod Security Policies provide a framework to ensure Pods run with appropriate privileges and can solely access the appropriate resources.
Scarleteel 2.0 and the MITRE ATT&CK framework
In this blog post, we will take a comprehensive dive into a real-world cyber attack that reverberated across the digital...
Detecting cryptomining attacks “in the wild”
Cryptomining attacks are becoming more notable in-line with the rise of blockchain and cryptocurrencies, so detecting cryptomining has become a...
Blackhat 2022 recap – Trends and highlights
Blackhat 2022, on its 25th anniversary, took place this week in Las Vegas. It’s the most important event for the...