Sysdig Site Search
Aligning Falco’s Cloudtrail Rules with MITRE ATT&CK
This blog will explain how Falco’s Cloudtrail plugin rules can be aligned with MITRE ATT&CK Framework for Cloud. One important...
Scarleteel 2.0 and the MITRE ATT&CK framework
In this blog post, we will take a comprehensive dive into a real-world cyber attack that reverberated across the digital...
Detecting cryptomining attacks “in the wild”
Cryptomining attacks are becoming more notable in-line with the rise of blockchain and cryptocurrencies, so detecting cryptomining has become a...
Blackhat 2022 recap – Trends and highlights
Blackhat 2022, on its 25th anniversary, took place this week in Las Vegas. It’s the most important event for the...
Evolving cloud security: Why identity infused CDR is the key
Minimizing the time to detect, investigate and respond to threats is crucial in stopping cloud attacks. In fact, this might...
8220 Gang Continues to Evolve With Each New Campaign
8220 Gang has been dubbed as a group of low-level script kiddies with an equally disappointing name based on their...
Runtime security in Azure Kubernetes Service (AKS)
Runtime security for Azure Kubernetes Service (AKS) environments requires putting controls in place to detect unexpected and malicious behavior across...
Enable Kubernetes Pod Security Policy with kube-psp-advisor.
Kubernetes Pod Security Policy is a mechanism to enforce best security practices in Kubernetes. In this tutorial, we will explain...
Improving AWS security services with Sysdig Secure
Learn about AWS security services and how third-party tools like the Falco and Sysdig Secure complement Amazon offerings for complete cloud security.
Cloud Detection and Response (CDR)
How to enable Kubernetes Pod Security policy using kube-psp-advisor to address the practical challenges of building a security policy on Kubernetes.