Sysdig Site Search
How to implement Docker image scanning with open source tools
In this article we will cover Docker image scanning with open source image scanning tools. We will explain how to...
gVisor+Falco: Strengthen K8s & Container Security Without Losing Visibility
Hear from the gVisor and Falco community developers that made it possible to leverage the powerful gVisor isolation and sandboxing capabilities while enjoying Falco’s deep visibility and flexible detection engine.
Responding to the Dropbox Breach with a Falco GitHub Plugin
On November 1st, Dropbox disclosed a security breach where the attackers stole over 130 code repositories after gaining access to...
Not your Parent’s Cloud Security: Real-time Cloud Threat Detection for GCP
Google Cloud Audit Logs record administrative actions and configuration changes in your cloud account. How can you better use this resource in real-time to spot and prioritize cloud threats?
5 Steps to Secure Containers and Prioritize Risk on GKE and Anthos
Ensuring your container images are free of vulnerabilities is easier said than done. Developers are overwhelmed with the number of CVEs in scan reports. How do you prioritize what to fix to reduce real risk?
Becoming a Cloud Security Ninja: Slice Your SIEM Costs by Pre-Processing Cloud Logs
The cloud threat landscape has evolved with the complex, and dynamic nature of the cloud provider platforms and the multitude of services that are available with the click of a button.
The Ultimate Strategy to Achieve PCI Compliance and Stay That Way on Azure
Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, from source to runtime and maintain proof of compliance.
Becoming a Cloud Security Ninja: Sharpen your Cloud Threat Detection Sword with Machine Learning
Cybercriminals have been developing their skills and attack techniques to expand into cloud and container workloads. How do your security teams defend the cloud infrastructure against an evolving threat landscape?
How to be Compliant with Mandates from SOC2, PCI, NIST etc. for your AWS Cloud infrastructure
Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks.
Crack the Exam Code to Become a Certified K8s Security Specialist (CKS)! Tips and Tricks to Prepare with Saiyam Pathak, CNCF Ambassador and Daniel Lemos, CKS
To help you crack the code to pass this exam, join Saiyam Pathak, CNCF Ambassador and Sydig’s most recent CKS, Daniel Lemos in a discussion about what it was really like to take the exam and pass, what worked and what would have helped in passing.