background graphic

Sysdig Site Search

Showing 21-30 of 299

OWASP Kubernetes Top 10

Blog

One of the biggest concerns when using Kubernetes is whether we are complying with the security posture and taking into...

Kubernetes security context, security policy, and network policy – Kubernetes security guide (part 2).

Blog

Once you have defined Kubernetes RBAC: users and services credentials and permissions, we can start leveraging Kubernetes orchestration capabilities to...

Comparing GuardDuty & Falco on EKS

Blog

Read about the differences between Amazon GuardDuty and Falco for Amazon EKS to better understand what each tool does, the threats detected, and the metadata available for forensic analysis.

ECS Fargate threat modeling

Blog

AWS Fargate is a technology that you can use with Amazon ECS to run containers without having to manage servers...

Pod Security Policies in production with Sysdig’s Kubernetes Policy Advisor

Blog

Sysdig Secure 3.0 introduces Kubernetes Policy Advisor to provide Kubernetes native prevention using Pod Security Policies (PSPs). This feature automates...

Cloud Defense in Depth: Lessons from the Kinsing Malware

Blog

In the face of persistent data breaches and escalating cyber threats, organizations are compelled to prioritize cloud defense in depth....

Sysdig Addresses Risk of Excessive Permissions with Cloud Infrastructure Entitlements Management

press releases

Sysdig, Inc. announced today the addition of Cloud Infrastructure Entitlements Management (CIEM) capabilities to the Secure DevOps Platform. Taking a zero trust approach, customers get instant visibility and control over cloud permissions.

GitOps Security with k8s-security-configwatch

Blog

the k8s-security-configwatch GitHub Action, an open source tool from Sysdig, secures your GitOps workloads by detecting changes on your Kubernetes...

Cloud lateral movement: Breaking in through a vulnerable container

Blog

Lateral movement is a growing concern with cloud security. That is, once a piece of your cloud infrastructure is compromised,...

Sysdig 2024 Cloud-Native Security and Usage Report

page

Organizations should prioritize cloud defense in depth. With a strong security plan, you can lay a foundation for a secure cloud environment.

1 2 3 4 5 30

Stay up to date! Sign up to receive our newsletter.