background graphic

Sysdig Site Search

Showing 1051-1060 of 1461

CSI Forensics: Unraveling Kubernetes Crime Scenes

Blog

This is the second episode of the CSI Container series, published and presented at CloudNativeSecurityCon 2024. In this episode, we...

Harden your LLM security with OWASP

Blog

Foundationally, the OWASP Top 10 for Large Language Model (LLMs) applications was designed to educate software developers, security architects, and...

CVE-2024-3094: Detecting the SSHD backdoor in XZ Utils

Blog

On March 29th, 2024, a backdoor in a popular package called XZ Utils was announced on the Openwall mailing list....

Prometheus Alertmanager Best Practices

Blog

Have you ever fallen asleep to the sounds of your on-call team in a Zoom call? If you’ve had the...

How to Monitor CoreDNS

Blog

CoreDNS is a DNS add-on for Kubernetes environments. It is one of the components running in the control plane nodes,...

Extortion in Cloud Storage

Blog

Extortion can simply be defined as “the practice of obtaining benefit through coercion.“ Data and cloud extortion schemes occur when...

Prometheus 2.35 – What’s new?

Blog

Prometheus 2.35 was released last month, focusing on a better integration with cloud providers. It also improved the service discovery,...

Getting started with runtime security and Falco

Blog

Discover how to get started with Falco to overcome the challenges of implementing runtime security for cloud-native workloads. If you...

How to deal with ransomware on Azure

Blog

Let’s dig deeper into the techniques used by attackers and the mitigations you should implement when ransomware on Azure affects...

What is Kubernetes CrashLoopBackOff? And how to fix it

Blog

CrashLoopBackOff is a Kubernetes state representing a restart loop that is happening in a Pod: a container in the Pod...

1 104 105 106 107 108 147

Stay up to date! Sign up to receive our newsletter.