Sysdig Site Search
Multi-condition alerting
Pager fatigue is real. And there’s nothing worse than getting woken up in the middle of the night for a...
Bad guys are watching for new openings in your cloud, are you?
You see the headlines, and perhaps, ‘thank goodness it wasn’t us’ flickers through your mind. An overly permissive web server...
What’s new in Kubernetes 1.20?
Kubernetes 1.20 is about to be released, and it comes packed with novelties! Where do we begin? As we highlighted...
A security journey to open source
After more than 10 years researching security issues, I wrote a book about it! I have been working in the...
Cost Advisor: Optimize and Rightsize your Kubernetes Costs
Kubernetes has broken down barriers as the cornerstone of cloud-native application infrastructure in recent years. In addition, cloud vendors offer...
Csysdig explained visually
Csysdig is an open source, htop-like interactive troubleshooting tool for Linux that is designed for monitoring and debugging containers. It...
Container security orchestration with Falco and Splunk Phantom.
Container security orchestration allows to define within your security policy how you are going to respond to your different container...
9 Open source cloud security tools for 2025
Open source cloud security tools offer organizations the flexibility, visibility, and shared expertise needed to keep pace with evolving threats....
Why you need to augment prevention-only posture with cloud detection and response
In the early days of cloud security, like in the early days of endpoint, the focus was on prevention. This...
A CISO’s grimoire for outsmarting attackers
For security leaders, staying vigilant and prepared is like wielding a well-crafted spellbook. OWASP, MITRE ATT&CK, and threat research are...