Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Is File-Level Restore, and Why Does It Matter for Kubernetes Backups?

Kubernetes environments move fast — and when something breaks, it can break fast. If you’re a platform engineer managing stateful apps or a DevOps lead keeping critical workloads alive, you’ve likely felt the sting of a storage misstep. One wrong file deletion or a corrupted directory, and suddenly you’re restoring entire volumes just to recover a few megabytes.

AI-driven CSPM: How GenAI will transform Cloud security posture management

Generative AI (GenAI) is poised to revolutionize the cloud security posture management (CSPM) space, bringing intelligence, automation, and context to increase the effectiveness of managing cloud risk. Maintaining a robust security posture in the cloud can be challenging as the number of deployed cloud services increases across diverse clouds. Soon, AI-driven CSPM will play a critical role in helping security and cloud teams to keep pace with misconfigurations and compliance gaps.

The evolution of the Sysdig Agent

For the past six years, I’ve had the unique privilege of contributing to and witnessing the evolution of Sysdig Agent. As a Technical Writer, I create educational content that helps Sysdig customers get the most value out of it. The Sysdig Agent, which began as a simple sniffer probing system calls, has transformed into a powerful defender of cyber threats and vulnerabilities, safeguarding workloads across regions—and even underwater in submarines! How cool is that?

Setting Up Astra's API Security with NGINX Ingress in Kubernetes

In this video, we’ll show you how to integrate Astra’s API Security Platform with your Kubernetes cluster using an NGINX Ingress controller. This setup allows Astra to passively observe live API traffic flowing through your ingress, enabling continuous vulnerability detection without interrupting your application. We'll cover.

How to Set Up Astra's API Traffic Collector in Kubernetes

In this step-by-step tutorial, we’ll walk you through setting up Astra’s API Traffic Collector inside a Kubernetes environment. This integration enables you to mirror live traffic to Astra's security engine—without impacting performance—so you can uncover vulnerabilities in real-time, without needing to configure test environments or rerun tests manually. You'll learn how to.

tj-actions/changed-files with Falco Actions

A compromise (CVE-2025-30066) was discovered in the popular GitHub Action tj-actions/changed-files on March 14, 2025. It impacted tens of thousands of repositories that use this action to track file changes. This blog will explain how Falco Actions can easily be integrated into your workflows to help detect this CI/CD attack and provide in-depth visibility. Falco Actions is an open-source project that monitors your CI/CD workflows for potential threats in real time, leveraging the OSS tool Falco.

From Zero to Hero: Master Kubernetes Backup with Palette VMO by Spectro Cloud

Kubernetes has become the foundation for modern applications—but with great flexibility comes greater complexity and risk. Whether it’s an accidental misconfiguration, a failed update, or a cluster-wide outage, disruptions happen fast—and when they do, they impact both your containers and the virtual machines (VMs) running alongside them. In these high-stakes moments, your recovery plan is what makes the difference between a brief hiccup and a full-blown disaster.

Sysdig and Google SecOps: Unifying cloud security for SOC teams

In our first blog post, “Sysdig Secure-Google Chronicle integration – Why, what, and how“, we introduced the idea of connecting both platforms, highlighting their complementary strengths and providing a high-level overview. Now, we’re taking it a step further—moving beyond theory to focus on practical, real-world applications.