Sysdig Site Search
Blackhat 2022 recap – Trends and highlights
Blackhat 2022, on its 25th anniversary, took place this week in Las Vegas. It’s the most important event for the...
How to Detect SCARLETEEL with Sysdig Secure
The recent SCARLETEEL incident highlights the importance of detecting security threats early in the development cycle. With Terraform state files,...
Scarleteel 2.0 and the MITRE ATT&CK framework
In this blog post, we will take a comprehensive dive into a real-world cyber attack that reverberated across the digital...
Enable Kubernetes Pod Security Policy with kube-psp-advisor.
Kubernetes Pod Security Policy is a mechanism to enforce best security practices in Kubernetes. In this tutorial, we will explain...
Runtime security in Azure Kubernetes Service (AKS)
Runtime security for Azure Kubernetes Service (AKS) environments requires putting controls in place to detect unexpected and malicious behavior across...
8220 Gang Continues to Evolve With Each New Campaign
8220 Gang has been dubbed as a group of low-level script kiddies with an equally disappointing name based on their...
Container security best practices: Comprehensive guide
Sticking to container security best practices is critical for successfully delivering verified software, as well as preventing severe security breaches...
Top 20 Dockerfile best practices
Learn how to prevent security issues and optimize containerized applications by applying a quick set of Dockerfile best practices in...
How Sysdig can detect Impersonation Attacks in Okta IdP
To combat the growing threat of identity attacks, organizations need to adopt a proactive approach that goes beyond traditional security...
The power of prioritization: Why practitioners need CNAPP with runtime insights
The heightened demand for cloud applications places a premium on the agility of development teams to swiftly create and deploy...