background graphic

Sysdig Site Search

Showing 1211-1220 of 1460

How to implement Docker image scanning with open source tools

Blog

In this article we will cover Docker image scanning with open source image scanning tools. We will explain how to...

gVisor+Falco: Strengthen K8s & Container Security Without Losing Visibility

webinars

Hear from the gVisor and Falco community developers that made it possible to leverage the powerful gVisor isolation and sandboxing capabilities while enjoying Falco’s deep visibility and flexible detection engine.

Responding to the Dropbox Breach with a Falco GitHub Plugin

Blog

On November 1st, Dropbox disclosed a security breach where the attackers stole over 130 code repositories after gaining access to...

Not your Parent’s Cloud Security: Real-time Cloud Threat Detection for GCP

webinars

Google Cloud Audit Logs record administrative actions and configuration changes in your cloud account. How can you better use this resource in real-time to spot and prioritize cloud threats?

5 Steps to Secure Containers and Prioritize Risk on GKE and Anthos

webinars

Ensuring your container images are free of vulnerabilities is easier said than done. Developers are overwhelmed with the number of CVEs in scan reports. How do you prioritize what to fix to reduce real risk?

Becoming a Cloud Security Ninja: Slice Your SIEM Costs by Pre-Processing Cloud Logs

webinars

The cloud threat landscape has evolved with the complex, and dynamic nature of the cloud provider platforms and the multitude of services that are available with the click of a button.

The Ultimate Strategy to Achieve PCI Compliance and Stay That Way on Azure

webinars

Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, from source to runtime and maintain proof of compliance.

Becoming a Cloud Security Ninja: Sharpen your Cloud Threat Detection Sword with Machine Learning

webinars

Cybercriminals have been developing their skills and attack techniques to expand into cloud and container workloads. How do your security teams defend the cloud infrastructure against an evolving threat landscape?

How to be Compliant with Mandates from SOC2, PCI, NIST etc. for your AWS Cloud infrastructure

webinars

Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks.

Crack the Exam Code to Become a Certified K8s Security Specialist (CKS)! Tips and Tricks to Prepare with Saiyam Pathak, CNCF Ambassador and Daniel Lemos, CKS

webinars

To help you crack the code to pass this exam, join Saiyam Pathak, CNCF Ambassador and Sydig’s most recent CKS, Daniel Lemos in a discussion about what it was really like to take the exam and pass, what worked and what would have helped in passing. 

1 120 121 122 123 124 146

Stay up to date! Sign up to receive our newsletter.