Quantcast
Channel: Kubernetes & Container Security | Sysdig
Browsing all 59 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How runtime insights helps with container security

Containers are a key building block for cloud workloads, offering flexibility, scalability, and speed for deploying applications. But as organizations adopt more and more containers, they encounter a...

View Article


FIX WHAT MATTERS: Bridging Code and Cloud Security

Learn how to boost your software supply chain security and address risk for containers and Kubernetes from development through production. The post FIX WHAT MATTERS: Bridging Code and Cloud Security...

View Article


Active Cloud Risk. How to Combat the Most Critical Threats

Hear from Sysdig and Amazon to understand how to detect, prioritize, and respond to active cloud risks and threats. The post Active Cloud Risk. How to Combat the Most Critical Threats appeared first on...

View Article

OWASP K8s Top 10 Projects: What Risks You Need to Prioritize

The post OWASP K8s Top 10 Projects: What Risks You Need to Prioritize appeared first on Sysdig.

View Article

The K8s Lowdown: Why Kubernetes is Your Cloud’s Best Friend

The post The K8s Lowdown: Why Kubernetes is Your Cloud’s Best Friend appeared first on Sysdig.

View Article


Image may be NSFW.
Clik here to view.

Vulnerability management in the microservice era: From zero to hero

In the world of cloud-native applications, microservices and Kubernetes have become the backbone of modern software architecture. The scalability, flexibility, and orchestration capabilities provided...

View Article

Image may be NSFW.
Clik here to view.

How runtime insights helps with container security

Containers are a key building block for cloud workloads, offering flexibility, scalability, and speed for deploying applications. But as organizations adopt more and more containers, they encounter a...

View Article

Code to Cloud Security with Checkmarx and Sysdig

Learn how to meet the security challenges of modern application development with containers. The post Code to Cloud Security with Checkmarx and Sysdig appeared first on Sysdig.

View Article


Detecting CVE-2025-22224 with Falco

The Shadowserver group recently identified over 41,500 internet-exposed VMware ESXi hypervisors vulnerable to CVE-2025-22224, a critical Time-of-Check Time-of-Use (TOCTOU) code execution attack. The...

View Article


Image may be NSFW.
Clik here to view.

Detecting and Mitigating IngressNightmare – CVE-2025-1974

On Monday, March 24, 2025, a set of critical vulnerabilities affecting the admission controller component of the Ingress NGINX Controller for Kubernetes was announced. In total, five vulnerabilities...

View Article

Sysdig Sage, Attack Surface Mgmt, Automation Flows & Reporting Webinar

Instructor Led Training Enhancing your security posture by effectively detecting & managing threats within your cloud-native environments The post Sysdig Sage, Attack Surface Mgmt, Automation Flows...

View Article

Image may be NSFW.
Clik here to view.

Next-Gen Container Security: Why Cloud Context Matters

Container security has experienced significant transformation over the past decade. From the emergence of foundational tools like Docker to the maturation of orchestration platforms such as...

View Article

Kubernetes 1.33 – What’s new?

Introducing Kubernetes 1.33: Cloud-native improvements for dev and security teams The Kubernetes 1.33 release continues the project’s momentum in delivering scalable, secure, and developer-friendly...

View Article


Cloud vs. on-prem vulnerability management: Hybrid matters

Vulnerability management requires different approaches in on-prem and cloud environments due to differences in infrastructure, scale, and operational models. As more organizations adopt hybrid...

View Article

Conoa and Sysdig: A powerful partnership for comprehensive cloud and...

Kubernetes has gone from experiment to essential — powering everything from fintech apps to telecom infrastructure and government services. But as environments scale, so do threats. By design,...

View Article


Top 15 Kubectl plugins for security engineers in 2025

Kubernetes environments keep getting more complex. Between multi-cloud setups, edge deployments, and a growing list of compliance requirements, keeping your clusters locked down is no small task....

View Article

Runtime is the real defense, not just posture

Imagine trying to defend a moving target by only studying a still image of it. That’s what most cloud security strategies look like today. Tools that scan for misconfigurations or check policy...

View Article


Image may be NSFW.
Clik here to view.

Falco is now available as an Amazon EKS add-on

We’re excited to announce that Falco, the CNCF graduated runtime security project, is now officially available as an AWS-validated Amazon EKS add-on. This marks a significant milestone in making...

View Article

The end of the prioritization-only era: Vulnerability management needs action

Security teams are drowning in vulnerability alerts. Every day seemingly brings another wave of CVEs, each demanding attention or flagged as “critical.” But not all vulnerabilities are created equal,...

View Article
Browsing all 59 articles
Browse latest View live


Latest Images