Sysdig Features, Cloud Security, Kubernetes & Container Security, Open Source
Why Traditional EDRs Fail at Server D&R in the Cloud
Cloud Security, Compliance, Kubernetes & Container Security, Monitoring, Open Source, Sysdig Features
What’s New in Sysdig – October 2023
Cloud Security (217) Compliance (56) Kubernetes & Container Security (205) Monitoring (96) Open Source (85) Sysdig Features (154) Threat Research (92)
Showing 25-36 of 85
Open Source, Kubernetes & Container Security
ChatGPT as your Falco Consultant
Can OpenAI ChatGPT become a contributor for an open source project like Falco? Is this the end of GitHub Copilot?...
gVisor+Falco: Strengthen K8s & Container Security Without Losing Visibility
Hear from the gVisor and Falco community developers that made it possible to leverage the powerful gVisor isolation and sandboxing capabilities while enjoying Falco’s deep visibility and flexible detection engine.
Jan 12, 2023 10am Pacific | 1pm Eastern
Crack the Exam Code to Become a Certified K8s Security Specialist (CKS)! Tips and Tricks to Prepare with Saiyam Pathak, CNCF Ambassador
To help you crack the code to pass this exam, join Saiyam Pathak, CNCF Ambassador and Sydig’s most recent CKS, Daniel Lemos in a discussion about what it was really like to take the exam and pass, what worked and what would have helped in passing.
Jan 5, 2023 10am Pacific | 1pm Eastern
Detect Container Security Threats
Looking to use open source tools to prepare, detect and respond to security threats in containers and Kubernetes? Wondering how you can create perimeters in the cloud?
Dec 14, 2022 10am Pacific | 1pm Eastern
Threat Research, Cloud Security, Kubernetes & Container Security, Open Source
Discovered new BYOF technique to cryptomining with PRoot
The Sysdig Threat Research Team (TRT) recently discovered threat actors leveraging an open source tool called PRoot to expand the...
Kubernetes 1.26 – What’s new?
Kubernetes 1.26 is about to be released, and it comes packed with novelties! Where do we begin? This release brings...
Monitoring, Open Source
How to Monitor the Kubelet
Monitoring Kubelet is essential when running Kubernetes in production. Kubelet is a very important service inside a Kubernetes cluster. This...
Kubernetes & Container Security, Open Source
Helm security and best practices
Helm is being used broadly to deploy Kubernetes applications as it is an easy way to publish and consume them...
Cybersecurity Strategy Must Include Both Shift-Left and Shield-Right Approaches
Cyber attacks are an unfortunate reality in our interconnected world. The art of keeping up with malicious actors is challenging, but even more so with the move to cloud-native technologies. As a result, security is evolving. Developers, DevOps, and cloud teams must now learn a new set of best practices that balance shift-left security and shield-right security approaches to reduce risk. This white paper developed in collaboration with our partner, Snyk, the leader in developer security, describe the underpinnings of modern cybersecurity programs in the world of containers, Kubernetes, and cloud.
Open Source, Threat Research
How to detect MFA spamming with Falco
Threat actors continue to evolve methods to access valid credentials using new techniques such as multi-factor authentication or MFA spamming...
Cloud Security, Kubernetes & Container Security, Open Source, Threat Research
Sysdig 2022 Threat Report: Cloud-native threats are increasing and maturing
The first annual cloud-native threat report from Sysdig explores some of the year’s most important security topics in the cloud....