Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What does Sysdig do?

What does #Sysdig do and how is it different from other cloud and container security tools? Hear CEO Suresh Vasudevan explain how Sysdig can help customers secure and monitor their containers on the cloud from source to runtime. Stay up to date on the latest cloud native news and trends, get all the info on latest vulnerabilities and discover new ways for securing and monitoring kubernetes and containers on our blog.

Escaping a Docker container

Escaping a docker container can get you access to the whole linux host, so it's a precious technique for a cyber attack. But it's also valuable for defenders: hacking docker containers to get a breakout is a fun way to better understand a vulnerability and how to better protect from these exploits! In this hands on video, we look at three real life scenarios where you can actually break out from a docker container.

Sysdig Talks 2022 Threat Landscape (Live)

Is your organization ready to pay an additional $430,000 cloud bill as a result of cryptojacking? The Sysdig Threat Research Team recently released the 2022 Sysdig Cloud-Native Threat Report, which details the cost of cryptojacking, the reality of software supply chain risks, and how hacktivism has become a prominent feature in cyber warfare. While the motives of hackers have not changed, they have adjusted their attack patterns and tactics to penetrate cloud environments more effectively. Fortify your cloud by understanding the current threat landscape and identifying defense strategies.

Falco 101 - What is Falco?

Here we will introduce Falco as a threat detection engine, defining its concepts and key components - events, rules and alerts. For the full, free Falco 101 course, including fully interactive hands-on labs and much more content to gain expertise on Falco for all kinds of experience levels, visit the Sysdig learning portal. Below are some of the topics you can expect to find as part of Falco 101.

Sysdig CSPM remediates security issues in seconds

Automate security issue fixes in seconds and reduce cloud risk with Sysdig. Let's dig in! We know cloud teams have tons of security issues. You can be spending hours trying to understand if those findings pose a real risk in your cloud environment. So, how can you shorten the time needed to triage every misconfiguration and take action on those that really matter to you? Discover how Sysdig aggregates security findings by root cause and prioritizes remediation based on impact and risk.

Secure your cloud from source to run

Security is changing, you need to adapt to the Cloud. Sysdig: Secure your Cloud from Source to Run. Cloud security that avoids, that alerts, closes gaps, grants access, takes charge. That checks out, that scales up, that keeps up. That’s there From source, to run. That’s Sysdig! A single view of risk. With no blind spots. Rich context to prioritize what matters. With no guesswork. A platform based on open standards. With no black boxes.

Hunting AWS RDS security events with Sysdig

The AWS RDS service itself falls on the AWS side of the Shared Responsibility model, but the day-to-day management of the RDS security instances falls on your side. When it comes to shared responsibility, your obligation depends on the AWS services that you deploy, and also other factors including (but not limited to) the sensitivity of your data, your company’s requirements, and applicable laws and regulations.