Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Sysdig: Ship Apps Faster on AWS with Unified Visibility and Security

Top performing DevOps teams automate more functions as part of their tool chain, including monitoring and security. With unified visibility and security across AWS tools and services, you can accelerate application delivery. Hear how teams are implementing a secure DevOps workflow to ship apps faster and confidently run them in production. Learn how you can.

Sysdig: NIST 800-53 Compliance in Containers & Kubernetes

Your applications are now starting to run on containers in the cloud. This means meeting regulatory compliance requirements is a top priority. Your security teams understand NIST 800-53 guidelines, but the challenge is a clear mapping of those NIST 800-53 controls to container/Kubernetes environments. Ultimately, you need to ensure compliance is not blocking your code from going into production.

Sysdig: Zero Trust Network Security for Containers and Kubernetes

As containers and Kubernetes are adopted in production, DevOps teams need to go beyond image scanning. Use cases such as runtime security, network visibility and segmentation, incident response and compliance become priorities as your Kubernetes security framework matures. Implementing Zero Trust network security is a must to prevent lateral movement, but where do you start?

Sysdig: Container Security Best Practices:Forensics & Incident Response

Containers are a technology that is here to stay. They're developer friendly, easy to operationalize, and allow organizations to provide stable and secure services to their customers. While there are clear best practices for what it takes to build and run containers, there isn't as much knowledge around the performing forensic analysis of incidents that occur inside your containers.

Sysdig: Kubernetes Attacks:What your cluster is trying to tell you

If an attacker got inside your cluster, would you know about it? Kubernetes has become the defacto standard for container orchestration, bringing with it a new set of security challenges. One of the biggest problems we see, among DevOps and Security teams alike, is a lack of knowing what to look for when it comes to malicious activity.

Sysdig: Container Security Best Practiceson Azure Kubernetes Service (AKS)

As containers and Kubernetes are adopted in production, security is a critical concern. DevOps teams need to go beyond image scanning, expanding into the areas of runtime security, network visibility and segmentation, incident response and compliance. These use cases become priorities as your Kubernetes security framework matures. Join Eric Carter of Sysdig and a guest from Microsoft, as we share an overview of security on Azure Kubernetes Service (AKS), discuss approaches used by open source and commercial tools, and hear how Azure users are keeping their code and containers secure without impacting developer productivity.

Sysdig: Accelerate your FedRAMP journey forcontainer security with Anitian & Sysdig

Cloud applications are transforming how government organizations fulfill their missions and serve the public. As new technologies, such as cloud, containers and serverless, are being adopted, it's critical to consider security and compliance requirements, like FedRAMP. However, the time and cost required to meet FedRAMP can be an inhibitor to market entry, especially in complex technological environments.

Sysdig: Accelerate Threat Detection AcrossClouds and Containers

Staying on top of misconfigurations, suspicious activity and threats across multiple clouds is difficult. Amid all the alerts, which ones actually pose a threat? How can you quickly and efficiently investigate threats with the many siloed container and cloud tools? It's time for a fresh approach to unify container and cloud security. Take advantage of an open-standards approach that is radically simple to run and scale.

Sysdig: Consistent Container Vulnerability Scanning with Red Hat & Sysdig

As modern app development moves at a fast pace and container/Kubernetes adoption has grown, security is topping the list of IT concerns. Image vulnerability scanning is a critical first line of defense for security with containers and Kubernetes. What's challenging is being able to automate security scanning for images AND achieve consistent scan results to assess risk. In this webinar, we'll share how Red Hat and Sysdig have teamed up to address both challenges so you can benefit from a higher level of accuracy, transparency, and trust in detecting CVEs.

Sysdig: Fighting Fraud:Worldpay Protects Cardholder Data with Sysdig & Red Hat OpenShift

Safeguarding sensitive credit card data in a massively dynamic multi-cloud infrastructure is no walk in the park. Hear how global payment service provider, Worldpay, is achieving its mission of 100% cloud usage with PCI compliance from development through production. Utilizing a secure DevOps approach with Red Hat OpenShift and Sysdig, Worldpay achieves container security at scale - and so can you.