Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Customer Corner: How Apree Health Gained Container Visibility and Achieved Compliance

Join David Quisenberry, Senior Manager of Information Security, and Cat Schwan, Security Team Lead, to learn how Sysdig’s powerful runtime insights empower Apree Health to identify, visualize, and eliminate Kubernetes vulnerabilities, threats, and misconfigurations in real time, and how automated evidence gathering and reporting helped them achieve both SOC 2 and HITRUST compliance. Interested in learning more about Sysdig Secure?

Cybersecurity in the Age of Regulation - Sysdig

Cybersecurity breaches are becoming more frequent and more impactful. Adversaries continue to grow stronger, and defenders aren’t always keeping pace. On July 26th, 2023, the U.S. Securities and Exchange Commission issued new regulations on cybersecurity risk management, strategy, governance, and incident disclosure, leaving many companies concerned about how to ensure compliance with these new rules, and what changes they may need to make to get up to speed.

SEC's Cyber Wake-up Call: The Evolving Role of the CISO (LIVE)

Join us for a LinkedIn Live panel discussion between industry experts Matt Stamper (CEO, Executive Advisors Group LLC), Colleen Lam (General Counsel, Sysdig), and Andrew Thorpe (Partner at Gunderson Dettmer and former Special Council at the SEC), as they dissect the seismic shifts in the cybersecurity landscape post the SEC's updated guidelines and the Solarwinds complaint.

Sysdig Attack Path in action: A new way to visualize cloud security risks

Discover "Risk Prioritization" and "Attack Path Analysis" - a powerful solution designed to tackle the challenges of protecting against modern cloud attacks head-on, and provide invaluable insights into cloud security. Powered by the Cloud Attack Graph, the new Risks page shows a prioritized list of the potential risks in your cloud infrastructure. The risks in the page are not merely just another list of prescriptions: they are periodically re-evaluated and re-prioritized based on the findings in your infrastructure.

Unparalleled Cloud Visibility in Action with Sysdig's Enhanced Searchable Inventory

Discover how Sysdig’s "Improved Inventory" can help you find your way inside your ever-growing cloud infrastructure with minimal effort. With Inventory, navigating the intricate network of your cloud resources becomes not just manageable, but intuitive. It provides a seamless interface that marries comprehensive visibility with dynamic searchability, making it the cornerstone of effective cloud security posture management.

Strengthening Your Security with Agentless Vulnerability Management

Discover how Sysdig Secure’s new “Agentless Vulnerability Management” approach helps you streamline the onboarding of new deployments, while significantly cutting down complexity and setup time. Agentless security tools generally rely on leveraging existing interfaces and APIs provided by the cloud service providers to collect information and perform vulnerability assessments.

Rethinking Cloud Security with Sysdig's CNAPP

Time is the currency of the cloud, where rapid innovation collides with fast-paced attacks. Discover how Sysdig's Cloud-Native Application Protection Platform (CNAPP) reimagines cloud security, leveraging the Cloud Attack Graph, powered by runtime insights to correlate assets, detect risks, and provide real-time insights. See how to connect the dots and uncover hidden attack paths, prioritize risks, and stop attacks in their tracks. With Sysdig, secure every second.

Combatting Cloud Threats: The Accelerated Attack Speed of 2023 (LIVE)

Cloud threats are evolving and attackers are moving faster than ever! Join Sysdig’s Michael Clark (Director, Threat Research) and Anna Belak (Director, Office of Cybersecurity Strategy) LIVE on Linkedin, Twitter, and Youtube, as they discuss key findings from Sysdig’s �������� ������������ ���������� ������������ ������������. From cloud automation as a weapon to software supply chain vulnerabilities — the annual report authored by Sysdig’s Threat Research Team exposes shocking statistics on the evolving tactics of attackers lurking within the clouds.