Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Containers

Inline response actions: Streamlining incident response in the cloud

Threat response is a cornerstone of cloud security, but its roots lie in the early days of antivirus software. Back then, responding to threats was fairly linear and straightforward — stop the malicious process, quarantine it, remove or delete if necessary, and move on. However, modern cloud environments have revolutionized how threats operate, making it clear just how much the game has changed.

Introducing Sysdig Threat Management: Combating threats in cloud security

Cloud security teams are often faced with an onslaught of noise from their detection tooling, making it nearly impossible to distinguish truly malicious threats from benign behaviors. Many threats will go uninvestigated simply because there aren’t enough analysts for the sheer amount of alerts, leaving organizations exposed to potential breaches.

Kubescape Joins CNCF Incubation: A Major Milestone in Kubernetes Security

We’re excited to announce that Kubescape has officially entered the CNCF Incubating stage! This achievement marks a huge step for the project. The 2021 idea, devised by Ben Hirschberg, ARMO CTO and Co-founder, to create a simple tool for scanning Kubernetes clusters against NSA-CISA hardening guidelines, has since developed, expanded, improved and matured. Kubescape is now a robust, full-fledged security platform, all thanks to the amazing support from the Kubescape community and CNCF.

Extending Falco for Bitcoin

Plugins are shared libraries that conform to a documented API, hooking into the core functionalities of Falco to allow things such as adding new event sources that can be evaluated using filtering expressions/Falco rules. Since Falco is open source, users can build plugins for just about any arbitrary 3rd party event source. In recent blog posts, we discussed how Falco can be extended to event stream sources such as Gitlab, Salesforce and Box via the Falco Plugin architecture.

Stay Ahead of Kubernetes Security: ARMO Platform Now Supports CIS Kubernetes Benchmark v1.10

Kubernetes security is an evolving challenge, and staying compliant with industry best practices is crucial. That’s why we’re excited to announce that ARMO now supports the latest CIS Kubernetes Benchmark v1.10! Get your Kubernetes Security Checklist now.

Introducing Vulnerability Management Enhancements for Sysdig Secure: Focus on Action

Vulnerability management in the cloud is more challenging than ever. Security teams are drowning in vulnerability alerts, asked to deal with them quickly even as the list continues to expand. What they lack is a clear path to remediation. Legacy tools flood teams with critical alerts, while offering little guidance on which fixes will be most impactful. Vulnerability management isn’t just about identifying the biggest risks — it’s about taking decisive action.

Top cloud misconfigurations: A CSPM perspective

Organizations benefit from the speed of the cloud, but with great power comes great responsibility. An inadvertent cloud misconfiguration can leave the door open to bad actors. While cloud configuration issues most often stem from human error or lack of awareness, they are unfortunately a leading cause of data breaches.

Cloud invaders: Spotting compromised users before it's too late

Identities have become one of the most common ways modern threat actors gain a foothold in the cloud. From stolen credentials to overly permissive roles and privilege escalation, attackers use a range of tactics to exploit identities and use them to launch devastating breaches. Once inside your environment, they can move laterally, exploit resources, or steal sensitive data, leaving security teams scrambling to contain the damage.