Cloud Security (124) Compliance (46) Kubernetes & Container Security (147) Monitoring (85) Open Source (55) Sysdig Features (111) Threat Research (60)
Showing 12 of 55
Kubernetes 1.26 – What’s new?
Kubernetes 1.26 is about to be released, and it comes packed with novelties! Where do we begin? This release brings...
How to Monitor the Kubelet
Monitoring Kubelet is essential when running Kubernetes in production. Kubelet is a very important service inside a Kubernetes cluster. This...
Helm security and best practices
Helm is being used broadly to deploy Kubernetes applications as it is an easy way to publish and consume them...
Cybersecurity Strategy Must Include Both Shift-Left and Shield-Right Approaches
Cyber attacks are an unfortunate reality in our interconnected world. The art of keeping up with malicious actors is challenging, but even more so with the move to cloud-native technologies. As a result, security is evolving. Developers, DevOps, and cloud teams must now learn a new set of best practices that balance shift-left security and shield-right security approaches to reduce risk. This white paper developed in collaboration with our partner, Snyk, the leader in developer security, describe the underpinnings of modern cybersecurity programs in the world of containers, Kubernetes, and cloud.
How to detect MFA spamming with Falco
Threat actors continue to evolve methods to access valid credentials using new techniques such as multi-factor authentication or MFA spamming...
Sysdig 2022 Threat Report: Cloud-native threats are increasing and maturing
The first annual cloud-native threat report from Sysdig explores some of the year’s most important security topics in the cloud....
26 AWS Security Best Practices to Adopt in Production
One of the most important pillars of a well-architected framework is security. Thus, it is important to follow these AWS...
Kubernetes 1.25 – What’s new?
Kubernetes 1.25 is about to be released, and it comes packed with novelties! Where do we begin? This release brings...
Blackhat 2022 recap – Trends and highlights
Blackhat 2022, on its 25th anniversary, took place this week in Las Vegas. It’s the most important event for the...
Prometheus 2.37 – The first long-term supported release!
Prometheus 2.37 is out and brings exciting news: this is the first long-term supported release. It’ll be supported for at...
How to secure Kubernetes deployment with signature verification
When running containers in a Kubernetes cluster, trusting the images you deploy is key to enforce security. The use of...