Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Visibility is key: Strengthening security with Sysdig

As digital operations expand, the financial industry is facing heightened regulatory and security demands. With the European Union’s Digital Operational Resilience Act (DORA) set to take effect in January 2025, financial organizations must now comply with additional rigorous standards for operational resilience and cybersecurity.

What's New in Calico: Fall 2024 Enhancements for Kubernetes Networking and Security

It’s almost time for KubeCon North America, and we’re excited to share the latest updates in Calico. These updates improve network and runtime security, make it easier to use, and extend Calico’s strong network security and observability for Kubernetes to VMs and hosts that are not part of Kubernetes clusters.

EMERALDWHALE: 15k Cloud Credentials Stolen in Operation Targeting Exposed Git Config Files

The Sysdig Threat Research Team (TRT) recently discovered a global operation, EMERALDWHALE, targeting exposed Git configurations resulting in more than 15,000 cloud service credentials stolen. This campaign used multiple private tools that abused multiple misconfigured web services, allowing attackers to steal credentials, clone private repositories, and extract cloud credentials from their source code. Credentials for over 10,000 private repositories were collected during the operation.

How Kubernetes Changes the Vulnerability Management Ball Game

Kubernetes has become a cornerstone in modern IT environments, significantly revolutionizing the way applications are deployed and managed. Its ability to automate scaling, deployment, and management of containerized applications makes it indispensable for businesses aiming for agility, scalability, and efficiency. As organizations increasingly adopt microservices architectures, Kubernetes’ role in providing seamless orchestration and robust security continues to grow in importance.

Identity is the Perimeter of the Cloud

93% of last year’s data breaches began with compromised credentials. Before the cloud, security perimeters were defined by physical walls and network boundaries, but in the cloud, that perimeter has all but dissolved. Consider what happened in November 2023, when a cloud observability vendor found evidence of unauthorized access to its staging environment — an environment that housed customer data and PII.

CrowdStrike Research Challenges Containerized Application Predictability Assumptions

Cloud workloads — and containers in particular — are often seen as immutable entities with predictable behavior. But recent CrowdStrike research suggests that some cloud security solutions rely too much on this premise, leading to suboptimal detection outcomes. CrowdStrike observes billions of container events each day. The data we collect gives us insights into real-world cloud workload behavior, which challenges these assumptions.

OpenInfra Days North America 2024: A Community Reunion and the Future of OpenStack

At Indiana University, OpenInfra Days North America 2024 was an event that brought together the brilliant minds of the open infrastructure community. For my teammate Kevin Jackson and I, this was not just another tech event; it was a long-overdue reunion with friends in the OpenStack community and an exciting opportunity to forge new relationships. The atmosphere was charged with collaboration and learning, with best practices, user journeys, and insightful panel discussions taking center stage.

CSI Forensics: Unraveling Kubernetes Crime Scenes

This is the second episode of the CSI Container series, published and presented at CloudNativeSecurityCon 2024. In this episode, we focus on Kubernetes CSI, how to conduct DFIR activities on K8s and containers, and how to perform static and dynamic analysis. As we covered in the first episode, DFIR refers to the union of Digital Forensics (DF) and Incident Response (IR). We also highlighted how conducting DFIR activities in a container environment differs from the usual DFIR in a host environment.

How Calico Helps with PCI Compliance for Containers and Kubernetes

The Payment Card Industry Data Security Standard (PCI DSS) is a global standard designed to ensure the security of cardholder information. It is crucial for any organization that stores, processes, or transmits payment card data to comply with PCI DSS to protect the integrity and confidentiality of cardholder information.

Sysdig 2024 Global Threat Report

We know that cloud attacks happen very quickly. Our 2024 global threat year-in-review, the third annual threat report from the Sysdig Threat Research Team (TRT), revisits the team’s hottest findings from the last 12 months and explores how they relate to the broader cyber threat landscape. This year’s report also includes informed predictions about 2025’s security outlook and potential trends.