background graphic

Sysdig Site Search

Showing 1251-1260 of 1462

Secure DevOps Best Practices for Multicloud Environments

webinars

Multicloud is inevitable. In fact, it’s likely you’re already using different clouds like AWS, Google Cloud, and Azure for various functions. But, how do you address risk and ensure proper security practices across all of your cloud accounts and deployments?

Scale up Threat Detection, Scale Down False Positives in the Cloud

webinars

The cloud vendors offer hundreds of cloud services your team may be using. How can you identify threats across these services without drowning in a sea of alerts? Join us to learn how to scale up threat detection and scale down false positives in the cloud.

Monitoring a Windows cluster with Prometheus

Blog

After trying several Prometheus exporters, I think I’m ready to fight the final boss: Monitoring a Windows cluster with Prometheus....

NIST 800-53 Compliance for Containers and Cloud

guides

NIST 800-53 represents a comprehensive set of controls broken down according to families, major controls, and sub controls. Many of these controls are interdependent and rely on adherence with one to impact others. With 800-53, organizations are able to work according to FedRAMP regulations, which keeps them operational at both a technology and business level.

Stackrox Acquisition: The Race to Secure Containers

Blog

Today, Red Hat announced its intent to acquire Stackrox. This is a very exciting development in the world of cloud-native...

Securing Kubernetes Checklist

guides

This checklist to provide guidance on choosing the right approach to security for containers and Kubernetes to stay ahead of cloud-native threats.

Introduction to instrumenting applications with Prometheus

Blog

As a developer, getting metrics from your application onto a Prometheus graph can seem daunting. We’ll look at analyzing your...

Measure what matters: 5 benchmarks every security leader should track

Blog

Are you looking to validate if your cloud services are resilient and adequately secured? Consider the following five cloud security...

Vulnerability management in the microservice era: From zero to hero

Blog

In the world of cloud-native applications, microservices and Kubernetes have become the backbone of modern software architecture. The scalability, flexibility,...

2024 Gartner® CNAPP Market Guide: Runtime insights is a core pillar of cloud-native application protection platforms

Blog

As organizations continue to look for consolidated platforms to address their security needs, an important shift has happened. Customers have...

1 124 125 126 127 128 147

Stay up to date! Sign up to receive our newsletter.