Sysdig Site Search
OWASP Kubernetes Top 10 Projects: What Risks You Need to Prioritize in 2023
Discover the art of prioritizing risks in Kubernetes platforms based on their commonality and probability, as outlined by the OWASP Kubernetes Top 10. Gain invaluable insights into how additional grouping of risks can enhance your security program, adding tremendous value to your defense strategy.
A Hacker’s Secrets to Ethically Cracking the Code in Today’s Digital World with Dr. Charlie Miller
Join us for a fireside chat with renowned ‘White Hat’ hacker, Dr. Charlie Miller. He will share details about his own behind-the-scenes journeys and how hackers exploit vulnerabilities and why corporations and governments should address cybersecurity before assets—or lives—are put at risk.
Three multi-tenant isolation boundaries of Kubernetes
Many of the benefits of running Kubernetes come from the efficiencies that you get when you share the cluster –...
Lower Your Kubernetes Bill By 40%!
Without utilization information for Kubernetes environments, developers are blind to where their cloud resources are over or under-allocated.
Strengthen Cybersecurity with Shift-left and Shield-right Practices
Keeping up with workload vulnerabilities and cyber threats is huge challenge every day for security teams – especially those deploying...
Making sense of Meltdown/Spectre
The IT world was put on its heels this past week as two of the most significant hardware exploits were...
5 Best practices for ensuring secure container images
Most modern organizations understand that the earlier you integrate security into the development process, the more secure the applications will...
Detecting jQuery File Upload vulnerability using Falco (CVE-2018-9206)
In the past few days, a new vulnerability was disclosed in a widely used component – jQuery File Upload plugin....
Kubernetes Monitoring with Prometheus: AlertManager, Grafana, PushGateway (part 2).
A complete ‘Kubernertes monitoring with Prometheus’ stack is comprised of much more than Prometheus servers that collect metrics by scraping...
Leadership Strategies for Risk Reduction, Transparency, and Speed
To respond to the increasing number of federal cybersecurity recommendations and regulations, cybersecurity leaders and their teams need to be...