Sysdig Site Search
Become a Certified K8s Security Specialist (CKS) in 2022! How to Pass with Saiyam Pathak, CNCF Ambassador
Join Sysdig and CNCF Ambassador Saiyam Pathak as we discuss key security concepts and tools, complemented with hands-on demo scenarios that will help you prepare for the CKS exam.
Unified threat detection for AWS cloud and containers
Implementing effective threat detection for AWS requires visibility into all of your cloud services and containers. An application is composed...
Detecting and Mitigating io_uring Abuse for Malware Evasion
What happened? How Sysdig and Falco users are protected Articles online have claimed this mechanism allows a user application to...
You’re Monitoring Kubernetes Wrong
A talk by Loris Degioanni, CEO Sysdig. Posted by the Cloud Native Computing Foundation.
2024 Cloud-Native Security and Usage Summary
The Sysdig 2024 Cloud‑Native Security and Usage Report comes at an exciting time after a year of cybersecurity making headlines...
Dynamic Docker Topology Mapping
With Sysdig you can create a dynamic topology map of your container infrastructure.
Monitoring Alibaba Container Service
99% of the time HackerNews is an awesome time sink, but every once in awhile something there inspires you to...
Checklist: Container Security From Code To Runtime
Read about best practices for securing your containers. Learn the essential elements including code security, image scanning, vulnerability prioritization, and runtime security, and how Sysdig and Snyk partner to secure containers and Kubernetes.
Cloud and Container Runtime Security on Azure
Join us to learn how Sysdig Secure extends the open-source Falco runtime security engine, and saves time creating and maintaining runtime policies.
SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft
The Sysdig Threat Research Team recently discovered a sophisticated cloud operation in a customer environment, dubbed SCARLETEEL, that resulted in...