background graphic

Sysdig Site Search

Showing 1381-1390 of 1477

What’s new in Kubernetes 1.16?

Blog

Kubernetes 1.16 is almost here and it’s packed with cool new features, like ephemeral containers for easy pod debugging, support...

Gee-Wiz! What a $30B Acquisition Means for Cloud Security and AI

webinars

The cloud security landscape changed overnight. With Google’s $30B+ acquisition of Wiz, CISOs, security leaders, and multi-cloud teams are left asking: What happens next?

Extending Falco for Bitcoin

Blog

Plugins are shared libraries that conform to a documented API, hooking into the core functionalities of Falco to allow things...

FIX WHAT MATTERS: Bridging Code and Cloud Security

webinars

Learn how to boost your software supply chain security and address risk for containers and Kubernetes from development through production.

The Grand Atlas of Software Security

infographics

This infographic demonstrates how to secure each stage of the software lifecycle, with a focus on the Shift Left approach, where early remediation reduces risks and costs.

Cloud Investigations in Just 5 Minutes: Exploring the Pitfalls of EDR for Cloud

webinars

Learn how to accelerate cloud investigation to combat fast-moving threats.

How to Safeguard GenAI Workloads in Exposed Environments (APAC)

webinars

Learn how to gain visibility into AI workloads, identify active risk and suspicious activity in real time, and ensure compliance with emerging AI guidelines.

The Business Impact of Time in Cloud Security

briefs

Organizations are migrating to the cloud to accelerate innovation. Inherently, with speed comes the risk of faster attacks. To combat these attacks, technology leaders must stop attacks and mitigate risk, in real time, across their cloud environments.

5 Essential Capabilities for a Modern CSPM Solution

briefs

Embracing the cloud is of paramount importance in delivering ongoing innovation to your customers. Nonetheless, the transition to cloud-native environments introduces security and compliance considerations that enterprises might not fully recognize.

2024 Cloud-Native Application Protection Platform (CNAPP) Buyers Guide

whitepapers

As the pace of cyberthreats and breaches accelerates, enterprise security teams struggle to manage risks and protect their environments against the evolving tactics and techniques attackers use to target cloud deployments.

1 137 138 139 140 141 148

Stay up to date! Sign up to receive our newsletter.