background graphic

Sysdig Site Search

Showing 1181-1190 of 1460

Cloud Defense in Depth: Lessons from the Kinsing Malware

Blog

In the face of persistent data breaches and escalating cyber threats, organizations are compelled to prioritize cloud defense in depth....

Falco 0.10.0 released.

Blog

We are happy to announce the release of Falco 0.10.0. This release incorporates a number of improvements focused on making...

Dig Deeper! Prioritize Cloud Vulnerabilities and Reduce Container Spending

webinars

Bad actors will find a way into your infrastructure whether through traditional approaches like misconfigurations and vulnerabilities; or more advanced approaches such as exploiting your supply chain, impersonating a user with stolen credentials, cloud entitlements, or other techniques. 

How the Critical OpenSSL Vulnerability may affect Popular Container Images

Blog

The big news this week is that a new CRITICAL OpenSSL vulnerability will be announced on November 1st, 2022. Critical-severity...

How to Detect and Respond to Threats Lurking in your GKE Workloads

webinars

The cloud-native landscape is riddled with stories of security breaches. Do you know what’s happening inside your containers on GKE?

Understanding Kubernetes Evicted Pods

Blog

What does it mean that Kubernetes Pods are evicted? They are terminated, usually the result of not having enough resources....

Announcing Falco 0.3.0

Blog

On Friday we released Falco 0.3.0. The biggest change in this release is significantly reduced cpu usage, involving changes in...

Falco’s Journey to CNCF graduation

Blog

In February 2024, Falco graduated within the Cloud Native Computing Foundation (CNCF). Graduation marks an important milestone for a journey...

Finding Suspicious Events with AWS CloudTrail: Fundamentals and Best Practices

webinars

You see the headlines, and think, “thank goodness it wasn’t us”. An overly permissive web server exposes 100 million+ consumer credit applications in an S3 bucket, leaving hundreds of millions of user records open to the public.

Detecting MITRE ATT&CK: Defense evasion techniques with Falco

Blog

The defense evasion category inside MITRE ATT&CK covers several techniques an attacker can use to avoid getting caught. Familiarizing yourself...

1 117 118 119 120 121 146

Stay up to date! Sign up to receive our newsletter.