CVE-2024-6387 – Shields Up Against RegreSSHion
On July 1st, the Qualys’s security team announced CVE-2024-6387, a remotely exploitable vulnerability in the OpenSSH server. This critical vulnerability is nicknamed “regreSSHion” because the root...
View ArticleIntroducing Layered Analysis for enhanced container security
Containerized applications deliver exceptional speed and flexibility, but they also bring complex security challenges, particularly in managing and mitigating vulnerabilities within container images....
View ArticleSANS Cloud-Native Application Protection Platforms (CNAPP) Buyers Guide
The SANS Cloud-Native Application Protection Platform (CNAPP) Buyers Guide gives companies a deep dive into what to look for in a CNAPP solution. As organizations continue to shift towards integrated...
View ArticleKubernetes 1.31 – What’s new?
Kubernetes 1.31 is nearly here, and it’s full of exciting major changes to the project! So, what’s new in this upcoming release? Kubernetes 1.31 brings a plethora of enhancements, including 37 line...
View ArticleHow highly effective CISOs lean forward with proactive risk management
No executive wants to be blindsided by risks that should have been reasonably anticipated, especially the CEO, CFO, and board members. In the CISO Desk Reference Guide, Gary Hayslip, Bill Bonney, and...
View ArticleOn-Prem and Kubernetes: A delicate relationship
In cloud security, context is everything. In the previous two installments of our Customers Care Chronicles, we wrote about how a security vendor needs to be a true business partner and the potential...
View ArticleShift left with the Sysdig extension for Visual Studio Code
Adversaries exploit security blind spots and sneak through traditional defenses to craft attacks that impact your operations, or even worse, your reputation. One recent example is the Revival Hijack...
View ArticleBridging the cloud security skill gap with Sysdig Sage™
Disruptive technologies have a learning curve in the pace of adoption and implementation. Training and education tend to follow a slower schedule and can have a hard time keeping up with discoveries...
View ArticleAmplify SOC efficiency via automated cloud detection and response with Sysdig...
Attackers born in the cloud Cloud attackers are swift and sophisticated, requiring robust threat detection and response programs that can keep pace with these malicious actors born in the cloud. They...
View ArticleCloud Security for Amazon Web Services
This guide offers a framework for establishing comprehensive security for cloud and containers in AWS environments with specific insights into how Sysdig complements AWS-native tools. The post Cloud...
View ArticleContainer security best practices: Comprehensive guide
Sticking to container security best practices is critical for successfully delivering verified software, as well as preventing severe security breaches and its consequences. These best practices are...
View ArticleWhy the Sysdig Windows agent matters in the cloud
The Sysdig Windows agent is a game-changer for cloud infrastructure, particularly when it comes to securing Windows containers in Kubernetes environments. While many endpoint protection agents are...
View ArticleHow to Build Custom Controls in Sysdig Secure
In the context of cloud security posture management (CSPM), custom controls are policies or rules that give security teams the flexibility to create and enforce policies. These are needed to manage...
View Article5 best practices for securing AWS cloud and containers
Reduce your risk from cloud misconfigurations, continuously scan for cloud and container vulnerabilities, detect abnormal activity, and prioritize threats to ensure your applications are secure across...
View ArticlePractical usage of Sysdig OSS
To address Sysdig’s 5/5/5 Benchmark, rapid troubleshooting and deep forensic investigation are crucial when a security breach or performance issue arises. While Falco excels at real-time threat...
View ArticleThe evolution of vulnerability scanning
As application development and deployment evolve, traditional tools alone can no longer handle the dynamic, ephemeral nature of cloud and cloud-native environments. This article explores how...
View ArticleFalco vs. Sysdig OSS: Choosing the Right Tool for the Job
The open-source ecosystem is rich with tools that empower developers and security practitioners alike. Two standout projects are Sysdig OSS and Falco, both of which leverage deep system-level...
View ArticleSecurity for Amazon EKS hybrid nodes: Bridging cloud and on-premises...
The introduction of Amazon Elastic Kubernetes Service (EKS) Hybrid Nodes by AWS is a game-changer for organizations striving to unify cloud and on-premises Kubernetes operations. Amazon EKS Hybrid...
View ArticleKubernetes 1.32 – What’s new?
Kubernetes 1.32 is right around the corner, and there are quite a lot of changes ready for the Holiday Season! So, what’s new in 1.32? Kubernetes 1.32 brings a whole bunch of useful enhancements,...
View ArticleForging the proverbial bulletproof container
The phrase “Forging the Proverbial Bulletproof Container” carries both metaphorical and practical significance, particularly in the areas of technology and security. It reflects the idea of building...
View Article