Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Unparalleled Cloud Visibility in Action with Sysdig's Enhanced Searchable Inventory

Discover how Sysdig’s "Improved Inventory" can help you find your way inside your ever-growing cloud infrastructure with minimal effort. With Inventory, navigating the intricate network of your cloud resources becomes not just manageable, but intuitive. It provides a seamless interface that marries comprehensive visibility with dynamic searchability, making it the cornerstone of effective cloud security posture management.

Strengthening Your Security with Agentless Vulnerability Management

Discover how Sysdig Secure’s new “Agentless Vulnerability Management” approach helps you streamline the onboarding of new deployments, while significantly cutting down complexity and setup time. Agentless security tools generally rely on leveraging existing interfaces and APIs provided by the cloud service providers to collect information and perform vulnerability assessments.

Rethinking Cloud Security with Sysdig's CNAPP

Time is the currency of the cloud, where rapid innovation collides with fast-paced attacks. Discover how Sysdig's Cloud-Native Application Protection Platform (CNAPP) reimagines cloud security, leveraging the Cloud Attack Graph, powered by runtime insights to correlate assets, detect risks, and provide real-time insights. See how to connect the dots and uncover hidden attack paths, prioritize risks, and stop attacks in their tracks. With Sysdig, secure every second.

How we operationalize security risk assessments at Vanta

This post is part of an ongoing series where you’ll hear directly from Vanta’s own Security, Enterprise Engineering, and Privacy, Risk, & Compliance Teams to learn about the team’s approach to keeping Vanta—and most importantly, our customers—secure. In today’s post, you’ll hear from Rob Picard, who leads Vanta’s Security team, and Matt Cooper, who leads Vanta’s Privacy, Risk, & Compliance team. ‍

How to Fix Your Domain Name Registrar Issues

Your domain is the route that all users, including your current and prospective customers, take to access your organization on the internet. While your actual system is set up with server IP addresses likely in a cloud environment, your users won't use a string of numbers to access your website. Instead, they will use your domain name and Domain Name System (DNS) routing to get to your site.

The Human Psychology Behind Cybersecurity with Bec McKeown

Welcome to Razorwire, the podcast that explores the intricate world of cybersecurity. I'm Jim, your host, and on this episode, we have a fascinating guest joining us: Bec McKeown, a renowned expert in the psychology behind security. This episode is a must-listen for cybersecurity professionals for three key reasons: Firstly, Bec delves into the challenges of conducting investigations and spotting deception in the cybersecurity field. Her insights will equip you with the tools to identify suspicious behaviour, such as stealing or leaking sensitive information.