Cloud Security (125) Compliance (46) Kubernetes & Container Security (148) Monitoring (85) Open Source (55) Sysdig Features (111) Threat Research (60)
Showing 12 of 119
4 Ways Sysdig Enables Value with Cloud and Container Adoption
Measuring the value of modern security tools can be complex. Security leaders are increasingly focused on improving security without impeding...
Threat Detection and Response for AWS Fargate
In this session, Sysdig and AWS will discuss how to tackle the unique challenges of securing serverless environments.
Dec 1, 2022 10am Pacific | 1pm Eastern
How global conflicts influenced cyber attack behaviors
The conflict between Russia and Ukraine includes a cyberwarfare component with government-supported threat actors and civilian hacktivists taking sides. The...
Extortion in Cloud Storage
Extortion can simply be defined as “the practice of obtaining benefit through coercion.“ Data and cloud extortion schemes occur when...
Analysis on Docker Hub malicious images: Attacks through public container images
Supply Chain attacks are not new, but this past year they received much more attention due to high profile vulnerabilities...
CSPM – Least privilege principle in practice
Cloud Security Posture Management (CSPM) aims to automate the identification and remediation of risks across your entire cloud infrastructure. A...
Detecting cryptomining attacks “in the wild”
Cryptomining attacks are becoming more notable in-line with the rise of blockchain and cryptocurrencies, so detecting cryptomining has become a...
Cloud Attacks Are Here: Threat Actors Like Containers Too!
Join us to learn about what Sysdig’s Threat Research Team is seeing out there and what you can do to protect yourself.
Nov 17, 2022 10am Pacific | 1pm Eastern
The Real Cost of Cryptomining: Adversarial Analysis of TeamTNT
TeamTNT is a notorious cloud-targeting threat actor, who generates the majority of their criminal profits through cryptojacking. Sysdig TRT attributed...
Becoming a Cloud Security Ninja: Sharpen your Cloud Threat Detection Sword with Machine Learning
Cybercriminals have been developing their skills and attack techniques to expand into cloud and container workloads. How do your security teams defend the cloud infrastructure against an evolving threat landscape?
Nov 15, 2022 10am Pacific | 1pm Eastern
Strengthen Cybersecurity with Shift-left and Shield-right Practices
Cyber attacks are an unfortunate reality in our interconnected world. The art of keeping up with malicious actors is challenging,...