background graphic

Sysdig Site Search

Showing 1151-1160 of 1460

OWASP Kubernetes Top 10 Projects: What Risks You Need to Prioritize in 2023

webinars

Discover the art of prioritizing risks in Kubernetes platforms based on their commonality and probability, as outlined by the OWASP Kubernetes Top 10. Gain invaluable insights into how additional grouping of risks can enhance your security program, adding tremendous value to your defense strategy.

A Hacker’s Secrets to Ethically Cracking the Code in Today’s Digital World with Dr. Charlie Miller

webinars

Join us for a fireside chat with renowned ‘White Hat’ hacker, Dr. Charlie Miller. He will share details about his own behind-the-scenes journeys and how hackers exploit vulnerabilities and why corporations and governments should address cybersecurity before assets—or lives—are put at risk.

Three multi-tenant isolation boundaries of Kubernetes

Blog

Many of the benefits of running Kubernetes come from the efficiencies that you get when you share the cluster –...

Lower Your Kubernetes Bill By 40%!

webinars

Without utilization information for Kubernetes environments, developers are blind to where their cloud resources are over or under-allocated.

Strengthen Cybersecurity with Shift-left and Shield-right Practices

Blog

Keeping up with workload vulnerabilities and cyber threats is huge challenge every day for security teams – especially those deploying...

Making sense of Meltdown/Spectre

Blog

The IT world was put on its heels this past week as two of the most significant hardware exploits were...

5 Best practices for ensuring secure container images

Blog

Most modern organizations understand that the earlier you integrate security into the development process, the more secure the applications will...

Detecting jQuery File Upload vulnerability using Falco (CVE-2018-9206)

Blog

In the past few days, a new vulnerability was disclosed in a widely used component –  jQuery File Upload plugin....

Kubernetes Monitoring with Prometheus: AlertManager, Grafana, PushGateway (part 2).

Blog

A complete ‘Kubernertes monitoring with Prometheus’ stack is comprised of much more than Prometheus servers that collect metrics by scraping...

Leadership Strategies for Risk Reduction, Transparency, and Speed

Blog

To respond to the increasing number of federal cybersecurity recommendations and regulations, cybersecurity leaders and their teams need to be...

1 114 115 116 117 118 146

Stay up to date! Sign up to receive our newsletter.