Blog
Our 2nd annual Docker Usage Report provides insight into real-world customer container deployments over the past year. Read about increasing densities, diversity in container runtimes, and details on what’s happening with orchestrators like Kubernetes.
Blog
One of the first questions Sysdig Secure and Sysdig Falco users have is how do I audit container activity or…
Blog
We love Slack and I know many of you do too. So now you can monitor containers (and your apps!)…
Blog
Effective Kubernetes security hinges on security response teams being able to quickly detect and respond to security threats on live…
Blog
The composability of Cloud Native platforms has dramatically changed the way we think about the management of these platforms. In…
Blog
The Sysdig Secure 1.5 release furthers our goal of unifying security, performance monitoring, and forensics. This release includes a new…
Blog
We are happy to announce the release of Falco 0.10.0. This release incorporates a number of improvements focused on making…
Blog
In addition of configuring the Kubernetes security features, a fundamental part of Kubernetes security is securing sensitive Kubernetes components such…
Blog
I am deeply honored and excited to become part of the Sysdig family. Leading Nimble Storage from its youngest days…
Video
With Sysdig you can create a dynamic topology map of your container infrastructure.
Blog
Kubernetes security logging primarily focuses on orchestrator events. The Kubernetes documentation provides a good starting point for auditing events of…
Blog
Once you have defined Kubernetes RBAC: users and services credentials and permissions, we can start leveraging Kubernetes orchestration capabilities to…