Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Why the Evolution of Zero Trust Must Begin with Data Protection

The need for “Zero Trust” today is no longer the same as what we talked about years ago when the term was first coined. Back then, businesses only had a handful of remote workers signing in to the corporate network. The common wisdom of the day dictated that you couldn’t implicitly trust the authentication of those remote users any longer because they weren’t on the company LAN and the common solution was installing two-factor authentication.

How to Secure Hybrid Teams Against Insider Threats

As businesses emerge from the pandemic, many are making strategic decisions about their long-term work arrangements. While there is a substantial debate about remaining remote or bringing people back to the office, many companies are choosing to meet in the middle, embracing a hybrid work arrangement that allows people to work both on-site and remotely.

Why the New Executive Order will result in wider rollout of Zero Trust Adoption

The zero trust model exists because of the volume and diversity of cyberthreats on the global landscape. Zero trust is a set of coordinated system management practices plus design principles for modern IT systems. The Biden administration’s executive order on Improving the Nation’s Cybersecurity names zero trust as an essential component in hardening federal agencies against internal and external threats to national security.

Sysdig and Red Hat: Bringing together security and DevOps with OpenShift

Ensuring application security and compliance is one of the biggest challenges for any organization deploying applications in production. You need to detect and block vulnerabilities, quickly respond to incidents, and meet compliance standards and policies. With the Sysdig Secure DevOps Platform, you can embed security, maximize availability, and validate compliance-transforming your DevOps workflow into a secure DevOps workflow.

Sysdig: K8s Limits and Requests: Monitoring and Troubleshooting by example

Are your Kubernetes applications not performing well enough? Is your infrastructure oversized? Kubernetes limits and requests dictate the resources available to your applications, so when they aren't set correctly your cluster suffers from CPU throttling and Out Of Memory Kills. Oversizing your infrastructure is an easy, but expensive, solution - there must be a better way.