Quantcast
Channel: Kubernetes & Container Security | Sysdig
Browsing all 59 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

CVE-2024-6387 – Shields Up Against RegreSSHion

On July 1st, the Qualys’s security team announced CVE-2024-6387, a remotely exploitable vulnerability in the OpenSSH server. This critical vulnerability is nicknamed “regreSSHion” because the root...

View Article


Image may be NSFW.
Clik here to view.

Introducing Layered Analysis for enhanced container security

Containerized applications deliver exceptional speed and flexibility, but they also bring complex security challenges, particularly in managing and mitigating vulnerabilities within container images....

View Article


Image may be NSFW.
Clik here to view.

SANS Cloud-Native Application Protection Platforms (CNAPP) Buyers Guide

The SANS Cloud-Native Application Protection Platform (CNAPP) Buyers Guide gives companies a deep dive into what to look for in a CNAPP solution. As organizations continue to shift towards integrated...

View Article

Kubernetes 1.31 – What’s new?

Kubernetes 1.31 is nearly here, and it’s full of exciting major changes to the project! So, what’s new in this upcoming release? Kubernetes 1.31 brings a plethora of enhancements, including 37 line...

View Article

How highly effective CISOs lean forward with proactive risk management

No executive wants to be blindsided by risks that should have been reasonably anticipated, especially the CEO, CFO, and board members. In the CISO Desk Reference Guide, Gary Hayslip, Bill Bonney, and...

View Article


Image may be NSFW.
Clik here to view.

On-Prem and Kubernetes: A delicate relationship

In cloud security, context is everything. In the previous two installments of our Customers Care Chronicles, we wrote about how a security vendor needs to be a true business partner and the potential...

View Article

Image may be NSFW.
Clik here to view.

Shift left with the Sysdig extension for Visual Studio Code

Adversaries exploit security blind spots and sneak through traditional defenses to craft attacks that impact your operations, or even worse, your reputation. One recent example is the Revival Hijack...

View Article

Image may be NSFW.
Clik here to view.

Bridging the cloud security skill gap with Sysdig Sage™

Disruptive technologies have a learning curve in the pace of adoption and implementation. Training and education tend to follow a slower schedule and can have a hard time keeping up with discoveries...

View Article


Image may be NSFW.
Clik here to view.

Amplify SOC efficiency via automated cloud detection and response with Sysdig...

Attackers born in the cloud Cloud attackers are swift and sophisticated, requiring robust threat detection and response programs that can keep pace with these malicious actors born in the cloud. They...

View Article


Cloud Security for Amazon Web Services

This guide offers a framework for establishing comprehensive security for cloud and containers in AWS environments with specific insights into how Sysdig complements AWS-native tools. The post Cloud...

View Article

Image may be NSFW.
Clik here to view.

Container security best practices: Comprehensive guide

Sticking to container security best practices is critical for successfully delivering verified software, as well as preventing severe security breaches and its consequences. These best practices are...

View Article

Image may be NSFW.
Clik here to view.

Why the Sysdig Windows agent matters in the cloud

The Sysdig Windows agent is a game-changer for cloud infrastructure, particularly when it comes to securing Windows containers in Kubernetes environments. While many endpoint protection agents are...

View Article

Image may be NSFW.
Clik here to view.

How to Build Custom Controls in Sysdig Secure 

In the context of cloud security posture management (CSPM), custom controls are policies or rules that give security teams the flexibility to create and enforce policies. These are needed to manage...

View Article


5 best practices for securing AWS cloud and containers

Reduce your risk from cloud misconfigurations, continuously scan for cloud and container vulnerabilities, detect abnormal activity, and prioritize threats to ensure your applications are secure across...

View Article

Image may be NSFW.
Clik here to view.

Practical usage of Sysdig OSS

To address Sysdig’s 5/5/5 Benchmark, rapid troubleshooting and deep forensic investigation are crucial when a security breach or performance issue arises. While Falco excels at real-time threat...

View Article


Image may be NSFW.
Clik here to view.

The evolution of vulnerability scanning

As application development and deployment evolve, traditional tools alone can no longer handle the dynamic, ephemeral nature of cloud and cloud-native environments. This article explores how...

View Article

Falco vs. Sysdig OSS: Choosing the Right Tool for the Job

The open-source ecosystem is rich with tools that empower developers and security practitioners alike. Two standout projects are Sysdig OSS and Falco, both of which leverage deep system-level...

View Article


Image may be NSFW.
Clik here to view.

Security for Amazon EKS hybrid nodes: Bridging cloud and on-premises...

The introduction of Amazon Elastic Kubernetes Service (EKS) Hybrid Nodes by AWS is a game-changer for organizations striving to unify cloud and on-premises Kubernetes operations. Amazon EKS Hybrid...

View Article

Kubernetes 1.32 – What’s new?

Kubernetes 1.32 is right around the corner, and there are quite a lot of changes ready for the Holiday Season! So, what’s new in 1.32? Kubernetes 1.32 brings a whole bunch of useful enhancements,...

View Article

Forging the proverbial bulletproof container

The phrase “Forging the Proverbial Bulletproof Container” carries both metaphorical and practical significance, particularly in the areas of technology and security. It reflects the idea of building...

View Article
Browsing all 59 articles
Browse latest View live


Latest Images