Sysdig Site Search
Sysdig and Google SecOps: Unifying cloud security for SOC teams
In our first blog post, “Sysdig Secure-Google Chronicle integration – Why, what, and how“, we introduced the idea of connecting...
Evolving cloud security: Why identity infused CDR is the key
Minimizing the time to detect, investigate and respond to threats is crucial in stopping cloud attacks. In fact, this might...
8220 Gang Continues to Evolve With Each New Campaign
8220 Gang has been dubbed as a group of low-level script kiddies with an equally disappointing name based on their...
Runtime security in Azure Kubernetes Service (AKS)
Runtime security for Azure Kubernetes Service (AKS) environments requires putting controls in place to detect unexpected and malicious behavior across...
Improving AWS security services with Sysdig Secure
Learn about AWS security services and how third-party tools like the Falco and Sysdig Secure complement Amazon offerings for complete cloud security.
Introducing Sysdig Threat Management: Combating threats in cloud security
Cloud security teams are often faced with an onslaught of noise from their detection tooling, making it nearly impossible to...
The power of prioritization: Why practitioners need CNAPP with runtime insights
The heightened demand for cloud applications places a premium on the agility of development teams to swiftly create and deploy...
How Sysdig can detect Impersonation Attacks in Okta IdP
To combat the growing threat of identity attacks, organizations need to adopt a proactive approach that goes beyond traditional security...
CVE-2025-32955: Security mechanism bypass in Harden-Runner Github Action
The Sysdig Threat Research Team (TRT) has discovered CVE-2025-32955, a now-patched vulnerability in Harden-Runner, one of the most popular GitHub...