Sysdig Site Search
Continuous Compliance on Azure
Organizations must validate compliance with industry standards, like PCI, NIST, and SOC2, during build and runtime and automatically measure progress against CIS benchmarks.
Align Your Cloud Security Plan with the Cybersecurity Exec Order
Global security breaches and the White House Executive Order (EO) have sped up the timeline to modernize cybersecurity for both the public and private sectors. The way applications are developed and deployed (in the cloud and on containers), means taking a look at cloud security, Zero Trust architectures, and regulatory compliance in order to meet the mandates, keep moving ahead of the hackers and reduce risk.
Container and Kubernetes Security Best Practices: Forensics & Incident Response
Conducting forensics and incident response for containers and Kubernetes helps you better understand security breaches, meet compliance requirements and recover quickly. On average, containers live less than 5 minutes, so having a cloud native incident response plan is critical.
Cloud Security for Amazon Web Services
This guide outlines key requirements and capabilities for establishing comprehensive security for AWS cloud services and containers.
Deploying a private PaaS: The good, the meh, and the aw crap
We occasionally run across awesome posts that we want to share with you. This one is about building your own...
How ShareThis uses Kubernetes in production
Right now, there is a lot of talk about using containers in production and very few cold, hard case studies...
OpenMetrics: Is Prometheus unbound?
This article will introduce OpenMetrics, compare it to the Prometheus exposition format and review the current status of its implementation....
Falco 0.13.0 Released: Kubernetes Audit Events Support
We recently released Falco 0.13.0, which is probably the most exciting release since Falco’s 0.1.0 release almost two and a...
Cloud vs. on-prem vulnerability management: Hybrid matters
Vulnerability management requires different approaches in on-prem and cloud environments due to differences in infrastructure, scale, and operational models. As...
5 Steps to Securing AI Workloads
In the past year alone, the number of artificial intelligence (AI) packages running in workloads grew by almost 500%. Which...