Cloud Security (125) Compliance (46) Kubernetes & Container Security (148) Monitoring (85) Open Source (55) Sysdig Features (111) Threat Research (60)
Showing 25-36 of 119
5 Best Practices to Prevent, Detect, and Respond to Threats Lurking Within Your Azure Cloud Workloads
The Cloud-Native landscape is riddled with stories of security breaches and threats. Sysdig Secure extends the open-source Falco engine to protect workloads at runtime.
Sep 20, 2022 10am Pacific | 1pm Eastern
Container Image Scanning for Azure Pipelines with Sysdig
Scanning a container image for vulnerabilities or bad practices in your Azure Pipelines using Sysdig Secure is a straightforward process....
Becoming a Cloud Security Ninja: Sharpen your Cloud Threat Detection Sword with Machine Learning
Cybercriminals have been developing their skills and attack techniques to expand into cloud and container workloads. How do your security teams defend the cloud infrastructure against an evolving threat landscape?
Sep 15, 2022 10am Pacific | 1pm Eastern
KSPM and How to improve your Kubernetes Security Posture
Kubernetes Security Posture Management or KSPM refers to the security state and capabilities in place to manage the defense of...
How to Improve Security for Cloud-Native App Platforms in 3 Easy Steps for Azure
All the cloud providers (including Microsoft Azure) have default controls suggested to secure your infrastructure. We at Sysdig believe in leveraging these and going beyond by following additional steps.
Sep 13, 2022 10am Pacific | 1pm Eastern
How Onna Technologies uses Snyk & Sysdig to secure the SDLC while saving time and money
Onna Technologies, a data centralization software company, integrates security across every facet of their development process by using Snyk and...
Combat Critical Cloud Vulnerabilities (EMEA)
Cloud and containers are being adopted by a broad set of organizations as they try to maintain a competitive advantage. In our recent Cloud-Native Security and Usage Report, we found that 75% of containers in the cloud have vulnerabilities!
Sep 7, 2022 4am Pacific | 7am Eastern
AWS Security Groups Guide
AWS Security Groups (and Network ACLs and VPCs) are some of the fundamental building blocks of security in your cloud...
The Quiet Victories and False Promises of Machine Learning in Security
Contrary to what you might have read on the Internet, machine learning (ML) is not magic pixie dust. It’s a...
26 AWS Security Best Practices to Adopt in Production
One of the most important pillars of a well-architected framework is security. Thus, it is important to follow these AWS...
Turbocharge your Azure security and compliance posture with Sysdig
This article is intended to summarize the security services and tools provided by Microsoft for Azure cloud. We will also...