Sysdig Site Search
How to monitor and troubleshoot Fluentd with Prometheus
Fluentd is an open source data collector widely used for log aggregation in Kubernetes. Monitoring and troubleshooting Fluentd with Prometheus...
Securing SSH on EC2: What are the real threats?
Every compliance audit will ask you to securing SSH, and every time a scanner checks the configuration or CSPM of...
Trends at Blackhat Asia 2022 – Kubernetes, Cloud Security and more
This week, BlackHat Asia 2022 took place in hybrid mode. It’s one of the most important events within the #infosec...
Monitor and troubleshoot Consul with Prometheus
In this article, you’ll learn how to monitor Consul by HashiCorp with Prometheus. Also, troubleshoot Consul control plane with Prometheus...
Preventing cloud and container vulnerabilities
Vulnerabilities are software bugs or weaknesses that could be used by an attacker. They could be present in the operating...
Lambda Threat – Best Practices for Lambda Security
Our security research team will explain a real attack scenario from the black box and white box perspective on how...
Pet surveillance with Falco – Home Security
If you are here, chances are that your pet is always running around, destroying things in your sweet house. We...
How to Establish a Culture of Secure DevOps
We’re constantly told to “Shift Left” and that Secure DevOps is the only way to have confidence in your cloud...
Prometheus query examples for monitoring Kubernetes
In this article, you will find 10 practical Prometheus query examples for monitoring your Kubernetes cluster. So you are just...
Detecting and Mitigating CVE-2021-25737: EndpointSlice validation enables host network hijack
The CVE-2021-25737 low-level vulnerability has been found in Kubernetes kube-apiserver where an authorized user could redirect pod traffic to private...