background graphic

Sysdig Site Search

Showing 1241-1250 of 1460

Detecting and mitigating CVE-2022-42889 a.k.a. Text4shell

Blog

A new critical vulnerability CVE-2022-42889 a.k.a Text4shell, similar to the old Spring4shell and log4shell, was originally reported by Alvaro Muñoz...

Becoming a Cloud Security Ninja: Sharpen Your SBOM and Protect Your Software Supply Chain

webinars

We have recently seen a huge increase in software supply chain attacks, leading to additional compliance requirements for software providers. We also hear a lot of new terms (SBOM, VEX, CSAF, etc) and standards popping up from different vendors and organizations. How do you keep up with this acronym soup?

Detecting suspicious activity on AWS using cloud logs

Blog

AWS offers a large spectrum of services and compute. The “shared responsibility” model in cloud presents a simplified structure of...

How attackers use exposed Prometheus server to exploit Kubernetes clusters

Blog

You might think that your metrics are harmless from a security point of view. Well, that’s not true, and in...

SBOM 101

Blog

During many recent security incidents, we hear a lot of messages about the lack of knowledge of the code dependencies,...

Shift left is only part of secure software delivery

Blog

We’re living in the age of accelerated consumption and delivery. You can get a seemingly infinite selection of products delivered...

Understanding cloud security

Blog

Discover how to manage cloud permissions and configurations, detect threats in the cloud, and apply a unified approach for cloud...

Why is MFA important to your cloud account

Blog

Recently, we have been facing a recurring problem related to cloud security – breaches based on credentials leak or breakage....

Secure DevOps Best Practices for Multicloud Environments

webinars

Multicloud is inevitable. In fact, it’s likely you’re already using different clouds like AWS, Google Cloud, and Azure for various functions. But, how do you address risk and ensure proper security practices across all of your cloud accounts and deployments?

Scale up Threat Detection, Scale Down False Positives in the Cloud

webinars

The cloud vendors offer hundreds of cloud services your team may be using. How can you identify threats across these services without drowning in a sea of alerts? Join us to learn how to scale up threat detection and scale down false positives in the cloud.

1 123 124 125 126 127 146

Stay up to date! Sign up to receive our newsletter.