Sysdig Site Search
The power of prioritization: Why practitioners need CNAPP with runtime insights
The heightened demand for cloud applications places a premium on the agility of development teams to swiftly create and deploy...
Detecting and Mitigating CVE-2023-4911: Local Privilege Escalation Vulnerability
Recently, Qualys discovered and reported a critical vulnerability affecting the popular GLIBC ecosystem, which is installed by default on most...
Day 2 Falco Container Security – Tuning the Rules
In the world of cybersecurity, noise is a critical issue associated with Day 2 operations. The complex nature of noise...
Tales from the Kube!
The attendants to Kubecon + Cloudnativecon Europe 2023 in Amsterdam were able to see the first edition of Tales from...
CSI Container: Can you DFIR it?
Do you like detective series? Have you ever thought about them actually taking place in cybersecurity? What do you think...
Three Ways Red Hat Acquiring CoreOS Helps Cloud Native
It was announced today that Red Hat has reached an agreement to purchase CoreOS. In many ways this acquisition makes...
Threat news: TeamTNT targeting misconfigured kubelet
TeamTNT is a prevalent threat actor who has been targeting cloud and virtual environments such as Kubernetes and Docker since...
SOC2 Compliance for Containers and Cloud
After this webinar, you will understand how other organizations are validating SOC2 compliance for their cloud applications.
Container and Kubernetes Security Best Practices: Forensics & Incident Response
Conducting forensics and incident response for containers and Kubernetes helps you better understand security breaches, meet compliance requirements and recover quickly. On average, containers live less than 5 minutes, so having a cloud native incident response plan is critical.
Detecting and Mitigating CVE-2022-22963: Spring Cloud RCE Vulnerability
Today, researchers found a new HIGH vulnerability on the famous Spring Cloud Function leading to remote code execution (RCE). The...