Sysdig Site Search
Cut Custom Metrics webinar – EMEA
Join us for an insightful discussion where you will learn: Why custom metrics are growing exponentially as well as what cardinality means. Best practices to reduce custom metrics costs. How to consolidate your monitoring tools to remove complexity and scale what you can observe.
Securing the Cloud: A Guide to Effective Vulnerability Management
This eBook serves as a comprehensive guide to evolving vulnerability management for cloud-native architectures.
Software Supply Chain Security Best Practices
Explore the fundamentals of software supply chain security providing useful tips to help you navigate its complexities and best practices to secure it.
Monitoring with Custom Metrics
Custom metrics are application-level or business-related tailored metrics, as opposed to the ones that come directly out-of-the-box from monitoring systems...
Should you put all your trust in the tools?
My father worked with some of the very first computers ever imported to Italy. It was a time when a...
Helm security and best practices
Helm is being used broadly to deploy Kubernetes applications as it is an easy way to publish and consume them...
Tales from the Kernel Parameter Side
Users live in the sunlit world of what they believe to be reality. But, there is, unseen by most, an...
A Comprehensive Approach to Cloud Threat Detection and Response
In this paper, we make a strong case that organizations need both agent-based and agentless monitoring solutions to maximize visibility and control.
Anatomy of Cloud Attacks
This article will cover three common cloud attack patterns: Ransomware, Supply chain compromise & Malware cryptomining
5 Steps to Securing Microsoft Azure Cloud Infrastructure
Tackling unique cloud security risks requires a continuous and automated approach. Our checklist outlines how organizations can set up the security strategy to follow as they move to the cloud.