background graphic

Sysdig Site Search

Showing 1271-1280 of 1462

Business Value Framework

guides

This business value framework provides specific customer examples of business impact created by onboarding secure DevOps. It will also guide you to estimate the Return on Investment (ROI) for your organization. Click to learn more.

CVE-2023-38545: High Severity cURL Vulnerability Detection

Blog

On Oct. 11, a new version of curl (8.4.0) was released where a couple of new vulnerabilities were fixed (CVE-2023-38545...

Cloud Security 101 for Financial Services

guides

A cloud security primer for security practitioners in financial services (finserv). Learn how to deal with the complex attack surface of the cloud with a multi-layered approach to cloud security.

Shift Cloud Security Left and Right with CNAPP, Powered by Runtime Insights – EMEA

webinars

To increase profitability in today’s business landscape, cloud-native applications deploy code on a continuous basis. However, conventional security methods are ill-suited for these environments as they operate independently and lack the ability to exchange information.

AWS Cloud Detection and Response Matrix for MITRE ATT&CK

guides

This e-book demonstrates how Falco can map its flexible rules engine to the MITRE ATT&CK tactics and techniques for AWS users, containers, and cloud.

Crack the Exam Code to Become a Certified K8s Security Specialist (CKS)! Tips and Tricks to Prepare with Saiyam Pathak, CNCF Ambassador

webinars

To help you crack the code to pass this exam, join Saiyam Pathak, CNCF Ambassador and Sydig’s most recent CKS, Daniel Lemos in a discussion about what it was really like to take the exam and pass, what worked and what would have helped in passing. 

Wie man sich auf die nächste log4j vorbereiten kann

webinars

Als neue kritische Schwachstellen in log4j, dem beliebten Open-Source-Utility zur Erzeugung von Logs in Java-Anwendungen, gefunden wurde, war schnelles Handeln gefragt.

Bereid je voor op de volgende log4j!

webinars

Bereid u voor op de volgende log4j door samen met Marcel Claassen van ons Solution Engineering-team te leren hoe u kunt bepalen of uw systemen zijn getroffen & hoe u zich kunt beschermen met mitigerende maatregelen.

Say Goodbye to PSPs?! Migrate your PSP Rules to OPA with No Hassle

webinars

One of the best alternatives for Kubernetes users to mitigate PSP deprecation is through the built-in admission controller utilizing Open Policy Agent (OPA) rules.

How to Prepare for the Next Log4j

webinars

Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks. 

1 126 127 128 129 130 147

Stay up to date! Sign up to receive our newsletter.