San Francisco, CA, USA
2013
  |  By Eric Carter
Generative AI (GenAI) is poised to revolutionize the cloud security posture management (CSPM) space, bringing intelligence, automation, and context to increase the effectiveness of managing cloud risk. Maintaining a robust security posture in the cloud can be challenging as the number of deployed cloud services increases across diverse clouds. Soon, AI-driven CSPM will play a critical role in helping security and cloud teams to keep pace with misconfigurations and compliance gaps.
  |  By Radhika Puthiyetath
For the past six years, I’ve had the unique privilege of contributing to and witnessing the evolution of Sysdig Agent. As a Technical Writer, I create educational content that helps Sysdig customers get the most value out of it. The Sysdig Agent, which began as a simple sniffer probing system calls, has transformed into a powerful defender of cyber threats and vulnerabilities, safeguarding workloads across regions—and even underwater in submarines! How cool is that?
  |  By Crystal Morin
A compromise (CVE-2025-30066) was discovered in the popular GitHub Action tj-actions/changed-files on March 14, 2025. It impacted tens of thousands of repositories that use this action to track file changes. This blog will explain how Falco Actions can easily be integrated into your workflows to help detect this CI/CD attack and provide in-depth visibility. Falco Actions is an open-source project that monitors your CI/CD workflows for potential threats in real time, leveraging the OSS tool Falco.
  |  By Manuel Boira
In our first blog post, “Sysdig Secure-Google Chronicle integration – Why, what, and how“, we introduced the idea of connecting both platforms, highlighting their complementary strengths and providing a high-level overview. Now, we’re taking it a step further—moving beyond theory to focus on practical, real-world applications.
  |  By Matt Kim
Container security has experienced significant transformation over the past decade. From the emergence of foundational tools like Docker to the maturation of orchestration platforms such as Kubernetes, the container security landscape looks different than it did even a few years ago. With Gartner predicting 95% of organizations will be running containerized applications in production by 2028, it’s clear that container security is going to be a key priority for most organizations moving forward.
  |  By Crystal Morin
Are you looking to validate if your cloud services are resilient and adequately secured? Consider the following five cloud security benchmarks to assess your organization’s cloud deployments. CISOs know that their security programs should be data-driven and that metrics are integral to communicating the status of security capabilities to organizational stakeholders, including the executive leadership team and the board of directors.
  |  By Sysdig Threat Research Team
On April 3, 2025, the National Security Agency and other partner agencies released a critical advisory about DNS and Fast Flux. They even called it a national security threat due to the potential dangers involved. In this article, we’ll go over what Fast Flux is and how Sysdig Secure detects this attack technique. We’ll also cover gathering potential Fast Flux domain names from VirusTotal.
  |  By Sysdig Team
The cloud has become the hub of modern data traffic. It offers organizations of all sizes unprecedented speed, flexibility, and countless collaboration options. However, cybercriminals also know how to exploit the power of the cloud for their own purposes, which is why proven security solutions—and service providers who can implement them quickly and in a customized manner—are in high demand.
  |  By Loris Degioanni
It’s been just over a year since open source Falco graduated from the Cloud Native Computing Foundation (CNCF) during KubeCon EU 2024, and the momentum hasn’t slowed down. From advancements in real-time threat response and expanded audit event collection across cloud-native environments, to reaching 150 million downloads and even new open-source technologies like Stratoshark being built on Falco’s libraries, the project continues to evolve rapidly.
  |  By Marla Rosner
In the past year alone, the number of artificial intelligence (AI) packages running in workloads grew by almost 500%. Which is to say: AI is everywhere, and it’s settling in for the long haul. Naturally, as helpful as they are, these AI workloads come with security challenges, including data exposure, adversarial attacks, and model manipulation. So as AI adoption accelerates, security leaders must build an AI workload security program to protect their organizations while enabling innovation.
  |  By Sysdig
Autonomous AI agents are no longer experimental—they’re writing code, executing commands, and making decisions in real time. But as AI coding agents become more powerful, they’re also introducing a new and often invisible attack surface. In this video, we break down: AI agents can install packages, run scripts, and modify systems instantly—often without traditional visibility. That means security teams need to rethink how they monitor and protect their environments.
  |  By Sysdig
A maximum-severity vulnerability is hitting React Server Components - and if you're running Next.js, you may be vulnerable by default. React disclosed CVE-2025-55182, nicknamed React2Shell, an unauthenticated remote code execution (CVSS 10.0) affecting React Server Components via the Flight protocol. Next.js tracks downstream exposure as CVE-2025-66478: That means internet-wide scanning is likely. Who’s affected?
  |  By Sysdig
84% of developers are using or planning to use AI tools in their workflow (Stack Overflow, 2025). AI coding assistants like Codex, GitHub Copilot, and CodeWhisperer are changing how we build software. But here’s the real question: Who secures AI-generated code? In this video, we break down: If you’re using AI to write code, you need: AI-generated code is still code. It must be reviewed, validated, and monitored.
  |  By Sysdig
What if you could analyze system calls, containers, and cloud workloads the same way you analyze packets in Wireshark? That’s exactly what Stratoshark does — deep visibility into hosts, containers, and cloud activity. Stratoshark is an open source analysis tool that brings the Wireshark-style workflow to system calls, containers, hosts, and cloud audit events.
  |  By Sysdig
Containers are supposed to be isolated — but what happens when that isolation breaks? In this video, we explain critical container escape vulnerabilities in runc, the default container runtime used by Docker and Kubernetes, and why they represent a serious container security risk. Recent disclosures known as the “Leaky Vessels” vulnerabilities show how a compromised container can escape its sandbox, access the host filesystem, and potentially take over the node.
  |  By Sysdig
It’s December, and Kubernetes 1.35 is almost here - with security changes that can break workloads or access paths if you upgrade unprepared. This video is a fast, practical security edition rundown for security and platform engineers: what changed, why it matters, and what to verify before you roll 1.35 into production. In this video (Kubernetes 1.35 security highlights): If you want a deeper dive, comment with what you’re running today (managed K8s vs self-managed, distro, container runtime, auth setup) and I’ll break down the safest upgrade path.
  |  By Sysdig
Based on our understanding of the Gartner report, security and risk management leaders should develop a strategy for addressing the unique and dynamic requirements for protecting hybrid cloud workloads. Gartner's recommendations for cloud workload security include: Sysdig is listed by Gartner® as a Representative Vendor for Cloud Workload Protection Platforms. Gartner also notes Sysdig in the list of companies building or acquiring CSPM capabilities.
  |  By Sysdig
For Dummies Series - Best practices, insights and recommendations.
  |  By Sysdig
How containers change your compliance lifecycle.
  |  By Sysdig
Get your containerized apps production-ready.
  |  By Sysdig
A unified approach for security, monitoring, and forensics in containerized and microservice environments.

Sysdig is the first unified approach to monitor and secure containers across the entire software lifecycle.

Sysdig was born out of the belief that open source tools will be at the foundation of your next generation infrastructure. See our projects for system visibility, and container security, as well as partner projects we’ve embraced.

Accelerate your transition to containers, and then have confidence in your ongoing operations. We've built the cloud-native intelligence platform to create a single, more effective way to secure, monitor, and assure your critical applications:

  • Container security (Sysdig Secure): Protect and assure your applications. Bring together image scanning and run-time protection to identify vulnerabilities, block threats, enforce compliance, and audit activity across your microservices.
  • Enterprise-grade Docker monitoring (Sysdig Monitor): Enhance software reliability and accelerate problem resolution with advanced Kubernetes integration and built-in Prometheus monitoring capabilities.
  • Automatic orchestrator integration (Sysdig ServiceVision): We use Sysdig ServiceVision to dynamically map services using metadata from Kubernetes, OpenShift, AWS, Azure, Google, Mesos, or Docker EE, and more. With this insight, you can isolate and solve problems faster.

Our container intelligence platform monitors and secures millions of containers across hundreds of enterprises, including Fortune 500 companies and web-scale properties.