Sysdig Site Search
16 Docker conferences and container events you shouldn’t miss
We find container events, and Docker conferences in particular, extremely useful for multiple reasons: It’s one of the best ways...
Sending little bobby tables to detention
Little Bobby Tables shows us why it’s a good idea to sanitize your database inputs to avoid SQL injection attacks:...
Friends don’t let friends Curl | Bash
You know those software installation instructions that tell you to download and run a script directly from the internet, as...
AWS CloudTrail vs CloudWatch: Log Differences
What is different about cloud log management versus on-premises? The answer may seem simple, but several elements such as CloudTrail...
How to monitor Istio, the Kubernetes service mesh
Istio service mesh allows you to add key capabilities like observability, security, and traffic management to your applications without having...
Falco 0.6.0 Released
We just released Falco 0.6.0. This has several great new features as well as continued improvement to the default ruleset....
Kubernetes pod autoscaler using custom metrics
In this post we are going to demonstrate how to deploy a Kubernetes autoscaler using a third party metrics provider....
Detecting ‘Leaky Vessels’ Exploitation in Docker and Kubernetes
Summary On January 31st 2024, Snyk announced the discovery of four vulnerabilities in Kubernetes and Docker. For Kubernetes, the vulnerabilities...
The operations identity crisis.
I was recently editing another of our blog posts and found myself typing the phrase “…developers and operations people.” What...
Zoom into Kinsing
The Kinsing attack has recently been reported by security researchers, and it is well known for targeting misconfigured cloud native...