Sysdig Site Search
Falco 0.13.0 Released: Kubernetes Audit Events Support
We recently released Falco 0.13.0, which is probably the most exciting release since Falco’s 0.1.0 release almost two and a...
Why MCP server security is critical for AI-driven enterprises
Model Context Protocol (MCP) server security A new, largely invisible backdoor has opened in the enterprise. It doesn’t look like...
Cloud vs. on-prem vulnerability management: Hybrid matters
Vulnerability management requires different approaches in on-prem and cloud environments due to differences in infrastructure, scale, and operational models. As...
5 Steps to Securing AI Workloads
In the past year alone, the number of artificial intelligence (AI) packages running in workloads grew by almost 500%. Which...
Extending Falco for Salesforce
In this blog post, we introduce the Salesforce Plugin for Falco, which ingests Salesforce Real-Time Event Monitoring Objects and transforms...
Optimizing Wireshark in Kubernetes
In Kubernetes, managing and analyzing network traffic poses unique challenges due to the ephemeral nature of containers and the layered...
Building Honeypots with vcluster and Falco: Episode II
This is part two in our series on building honeypots with Falco, vcluster, and other assorted open source tools. For...
Exploring Syscall Evasion – Linux Shell Built-ins
This is the first article in a series focusing on syscall evasion as a means to work around detection by...
Cloud Security and the Power of Runtime Insights
Today’s digital organizations thrive in the cloud. The advantages are undeniable – cost savings, scalability, and seamless access to resources,...
Kernel introspection from Linux to Windows
The cybersecurity landscape is undergoing a significant shift, moving from security tools monitoring applications running within userspace to advanced, real-time...