Sysdig Site Search
Getting started with Kubernetes audit logs and Falco
As Kubernetes adoption continues to grow, Kubernetes audit logs are a critical information source to incorporate in your Kubernetes security...
The Container Ecosystem Project
The ecosystem of awesome new technologies emerging around containers and microservices can be a little overwhelming, to say the least....
GitHub & Supply Chain Risks
Contributing members of the open source project git deployed a code change in June 2022 that switched the default file...
Are vulnerability scores misleading you? Understanding CVSS score
Vulnerabilities are everywhere. Vetting, mitigating, and remediating them at scale is exhausting for security practitioners. Let’s keep in mind that...
In-use vulnerability prioritization
Vulnerability management has always been a challenge, but today’s security teams are feeling the pressure more than ever. With thousands...
Prioritize Security Without Sacrificing Productivity: Balancing Identity Management and Risk Tolerance
In the fast-paced, large-scale world of digital business, establishing and managing an acceptable risk tolerance related to user identities —...
Run Faster, Runtime Followers
Recently, there has been a flurry of announcements claiming to have what we call Runtime Insights, the ability to prioritize...
K8s security guide.
In this K8s security guide we cover the most significant aspects of implementing K8s security best practices. K8s security, like...
SANS Cloud-Native Application Protection Platforms (CNAPP) Buyers Guide
The SANS Cloud-Native Application Protection Platform (CNAPP) Buyers Guide gives companies a deep dive into what to look for in...
Understanding Kubernetes Limits and Requests
When working with containers in Kubernetes, it’s important to know what are the resources involved and how they are needed....