Sysdig Site Search
Detecting and mitigating CVE-2022-42889 a.k.a. Text4shell
A new critical vulnerability CVE-2022-42889 a.k.a Text4shell, similar to the old Spring4shell and log4shell, was originally reported by Alvaro Muñoz...
Becoming a Cloud Security Ninja: Sharpen Your SBOM and Protect Your Software Supply Chain
We have recently seen a huge increase in software supply chain attacks, leading to additional compliance requirements for software providers. We also hear a lot of new terms (SBOM, VEX, CSAF, etc) and standards popping up from different vendors and organizations. How do you keep up with this acronym soup?
Detecting suspicious activity on AWS using cloud logs
AWS offers a large spectrum of services and compute. The “shared responsibility” model in cloud presents a simplified structure of...
How attackers use exposed Prometheus server to exploit Kubernetes clusters
You might think that your metrics are harmless from a security point of view. Well, that’s not true, and in...
SBOM 101
During many recent security incidents, we hear a lot of messages about the lack of knowledge of the code dependencies,...
Shift left is only part of secure software delivery
We’re living in the age of accelerated consumption and delivery. You can get a seemingly infinite selection of products delivered...
Understanding cloud security
Discover how to manage cloud permissions and configurations, detect threats in the cloud, and apply a unified approach for cloud...
Why is MFA important to your cloud account
Recently, we have been facing a recurring problem related to cloud security – breaches based on credentials leak or breakage....
Secure DevOps Best Practices for Multicloud Environments
Multicloud is inevitable. In fact, it’s likely you’re already using different clouds like AWS, Google Cloud, and Azure for various functions. But, how do you address risk and ensure proper security practices across all of your cloud accounts and deployments?
Scale up Threat Detection, Scale Down False Positives in the Cloud
The cloud vendors offer hundreds of cloud services your team may be using. How can you identify threats across these services without drowning in a sea of alerts? Join us to learn how to scale up threat detection and scale down false positives in the cloud.