resources
 > Content library

Browse all content by asset type.

filter by:
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Blog Posts

2025 Gartner® CNAPP Market Guide: Runtime visibility is no longer optional
2025 Gartner® CNAPP Market Guide: Runtime visibility is no longer optional
No items found.

2025 Gartner® CNAPP Market Guide: Runtime visibility is no longer optional

Chris Petty
|
August 7, 2025
Threat hunting with Sysdig: Uncovering “IngressNightmare”
Threat hunting with Sysdig: Uncovering “IngressNightmare”
Cloud Security

Threat hunting with Sysdig: Uncovering “IngressNightmare”

David Huckaby
|
August 6, 2025
Open Source Spotlight: From alerts to action with AI-powered Falco Vanguard
Open Source Spotlight: From alerts to action with AI-powered Falco Vanguard
Cloud Security

Open Source Spotlight: From alerts to action with AI-powered Falco Vanguard

Mike Watson and Miguel De Los Santos
|
August 6, 2025

Briefs

BRIEF. 2025 Cloud‐Native Security and Usage Report
BRIEF. 2025 Cloud‐Native Security and Usage Report

BRIEF. 2025 Cloud‐Native Security and Usage Report

This is a special edition of Sysdig’s 2025 Cloud-Native Security and Usage Report, providing only the usage and analysis of the open source detection tool, Falco.

BRIEF. Top 5 Best Practices For Image Scanning
BRIEF. Top 5 Best Practices For Image Scanning

BRIEF. Top 5 Best Practices For Image Scanning

How do you manage container security risk without slowing down application delivery?

5 best practices for securing AWS cloud and containers
5 best practices for securing AWS cloud and containers

5 best practices for securing AWS cloud and containers

Learn how to automate efficient security and compliance controls in Amazon Web Services (AWS). Secure and accelerate your cloud innovation on AWS with five best practices for cloud and container security.

Case Studies

BigCommerce Achieves Real-Time Cloud Security

BigCommerce Achieves Real-Time Cloud Security

With Sysdig Secure, organizations were able to quickly scan their containers for impacted images and discern their risk in less than five minutes.

Healthcare IT Provider Cuts Alerts by 99.8%, Reduces Vulnerability Noise by 98%

Healthcare IT Provider Cuts Alerts by 99.8%, Reduces Vulnerability Noise by 98%

Healthcare IT Provider boosts compliance automation by 75%, detects threats in real time & reduces audit prep by 80%

Loglass Scales Compliance to Secure Cloud Growth with Sysdig

Loglass Scales Compliance to Secure Cloud Growth with Sysdig

Loglass accelerates cloud security and compliance on AWS in weeks, gains real-time risk visibility & AI guidance

Ebooks

Top 6 Use Cases for Monitoring Cloud-Native Workloads with Sysdig Monitor
Top 6 Use Cases for Monitoring Cloud-Native Workloads with Sysdig Monitor

Top 6 Use Cases for Monitoring Cloud-Native Workloads with Sysdig Monitor

Securing the Cloud: The Benefits of Falco with an Enterprise Experience
Securing the Cloud: The Benefits of Falco with an Enterprise Experience

Securing the Cloud: The Benefits of Falco with an Enterprise Experience

An ebook with 3 mini case studies heavily featuring Falco and how it works with Sysdig, plus a callout to Falco Feeds at the end.

The Value of Sysdig's CNAPP
The Value of Sysdig's CNAPP

The Value of Sysdig's CNAPP

Guides

Cloud Security for Google Cloud
Cloud Security for Google Cloud

Cloud Security for Google Cloud

This guide outlines key requirements and capabilities for establishing comprehensive security for Google Cloud services and containers.

Cloud Security for Amazon Web Services
Cloud Security for Amazon Web Services

Cloud Security for Amazon Web Services

This guide outlines key requirements and capabilities for establishing comprehensive security for AWS cloud services and containers.

Secure Your Cloud in Minutes - Your Checklist for Meeting the 555 Benchmark
Secure Your Cloud in Minutes - Your Checklist for Meeting the 555 Benchmark

Secure Your Cloud in Minutes - Your Checklist for Meeting the 555 Benchmark

Sysdig’s 555 Benchmark for Cloud Detection and Response offers a standard to use when measuring how fast your security teams can counter attackers. Specifically, the benchmark finds that to outpace attacks, your security teams need to detect threats within 5 seconds, correlate and triage data within the first 5 minutes, and initiate a tactical response within the next 5 minutes.Sysdig’s 555 Benchmark for Cloud Detection and Response offers a standard to use when measuring how fast your security teams can counter attackers. Specifically, the benchmark finds that to outpace attacks, your security teams need to detect threats within 5 seconds, correlate and triage data within the first 5 minutes, and initiate a tactical response within the next 5 minutes.

Infographics

Unlock the Power of NIS2
Unlock the Power of NIS2

Unlock the Power of NIS2

The Evolution of Modern Cloud Security
The Evolution of Modern Cloud Security

The Evolution of Modern Cloud Security

Remember asking your teachers why you needed to know history? They probably said that learning history is important in understanding how society has changed and progressed over time, and that we can learn from past experiences and mistakes.

The Grand Atlas of Software Security
The Grand Atlas of Software Security

The Grand Atlas of Software Security

This infographic demonstrates how to secure each stage of the software lifecycle, with a focus on the Shift Left approach, where early remediation reduces risks and costs.

Podcasts

"Screaming in the Cloud - August 3, 2023: Exposing The Latest Cloud Threats"

"Screaming in the Cloud - August 3, 2023: Exposing The Latest Cloud Threats"

"Corey is joined by Anna Belak, Director, Office of Cybersecurity Strategy at Sysdig, to discuss the 2023 Global Cloud Threat Report."

Screaming in the Cloud Podcast : Making Sense of Data

Screaming in the Cloud Podcast : Making Sense of Data

"Screaming in the Cloud host Corey Quinn was recently joined by Harry Perks, Principal Product Manager at Sysdig to discuss challenges in the observability space."

Screaming in the Cloud Podcast

Screaming in the Cloud Podcast

"Corey is joined by Michael Clark, Director of Threat Research at Sysdig, to discuss the refreshingly non-salesy approach of the 2022 Sysdig Cloud-Native Threat Report."

Press Releases

Sysdig Donates Stratoshark to the Wireshark Foundation to Advance Open Source Cloud Security
Sysdig Donates Stratoshark to the Wireshark Foundation to Advance Open Source Cloud Security

Sysdig Donates Stratoshark to the Wireshark Foundation to Advance Open Source Cloud Security

Open source Falco — used by over 60% of the Fortune 500 — delivers real-time cloud threat detection. Stratoshark complements…

May 14, 2025
Amid Global Expansion and >330% Growth of Sysdig Sage™ AI, Sysdig Appoints Gary Olson CRO and Crendal Kear CBO
Amid Global Expansion and >330% Growth of Sysdig Sage™ AI, Sysdig Appoints Gary Olson CRO and Crendal Kear CBO

Amid Global Expansion and >330% Growth of Sysdig Sage™ AI, Sysdig Appoints Gary Olson CRO and Crendal Kear CBO

Former Snyk CRO Gary Olson and Former Zscaler VP Crendal Kear join Sysdig to propel the company toward $250 million…

March 13, 2025
Sysdig Usage Report Reveals that Machine Identities Outnumber Humans 40,000 to 1, Presenting a Major Challenge to Enterprise Security
Sysdig Usage Report Reveals that Machine Identities Outnumber Humans 40,000 to 1, Presenting a Major Challenge to Enterprise Security

Sysdig Usage Report Reveals that Machine Identities Outnumber Humans 40,000 to 1, Presenting a Major Challenge to Enterprise Security

Cloud defenders are gaining ground as the cloud landscape comes into focus, with 92% of organizations operating without risky human…

March 12, 2025

Reports

2019 Container Usage Report
2019 Container Usage Report

2019 Container Usage Report

This data represents usage at companies around the world, from a broad range of industries. Our unique vantage point lets us discover details about the current use of infrastructure, applications, and containers, as well as security and compliance.

ISG Research. Cloud Native Observability Solutions Quadrant Report 2020
ISG Research. Cloud Native Observability Solutions Quadrant Report 2020

ISG Research. Cloud Native Observability Solutions Quadrant Report 2020

ISG Provider Lens™ Quadrant Report | September 2020. The ISG Provider Lens™ study offers the following to IT decision makers: (1) Transparency on the strengths and weaknesses of relevant providers, (2) A differentiated positioning of providers by segments, (3) A view of the global services market with a focus on the U.S.

ISG Research. Cloud Native Container Services 2022
ISG Research. Cloud Native Container Services 2022

ISG Research. Cloud Native Container Services 2022

ISG Provider Lens™ Quadrant Report | September 2022. The ISG Provider Lens™ study offers the following to IT decision makers: (1) Transparency on the strengths and weaknesses of relevant providers, (2) A differentiated positioning of providers by segments, (3) A view of the global services market with a focus on the U.S.

Videos

Detecting Threats to Kubernetes, Containers, and Google Cloud

Detecting Threats to Kubernetes, Containers, and Google Cloud

See how Sysdig helps secure and accelerate innovation with Google Cloud.

Secure DevOps Practices at Yahoo Japan

Secure DevOps Practices at Yahoo Japan

With more than 3,000 developers and a large Kubernetes environment, learn how Yahoo Japan is preventing cyber-attacks and unauthorized access by introducing appropriate security measures for the container environment.

Securing and Monitoring AWS Container Services

Securing and Monitoring AWS Container Services

Developers, operations, and security teams must work together to address key workflows to secure and monitor containers, Kubernetes and cloud services across...

Webinars

Break the Bot: The Ultimate AI Challenge
Break the Bot: The Ultimate AI Challenge

Break the Bot: The Ultimate AI Challenge

Join us Aug 13 for an exclusive, hands-on demonstration of Sysdig's latest AI security innovations. Our new demo, Break the Bot: The Ultimate AI Challenge, gives you a front-row seat to the real-world risks AI introduces—and how Sysdig stops attackers in their tracks.

Aug 13, 2025 11 am CEST | 10am BST
Packets, Pods & Prompts: Why Open Source is the Future of Cloud Security
Packets, Pods & Prompts: Why Open Source is the Future of Cloud Security

Packets, Pods & Prompts: Why Open Source is the Future of Cloud Security

Join this exclusive conversation with three titans of open source—the minds behind Falco, Wireshark, and Kubernetes—as they explore why open-source models are not just resilient, but essential to the next wave of cloud security.

From EDR to CNAPP
From EDR to CNAPP

From EDR to CNAPP

As the cloud-native ecosystem evolves, so do its security demands. Traditional EDR and vulnerability management tools fall short in environments where workloads are dynamic, and constantly scaling.

Jul 16, 2025 1PM CEST | 12PM BST

Whitepapers

Securing AI: Navigating a New Frontier of Security Risk

Securing AI: Navigating a New Frontier of Security Risk

Organizations worldwide are turning to artificial intelligence (AI) to gain insights, optimize operations, and remain competitive in an increasingly digitized economy. As businesses move workloads to cloud‑native environments to support these AI initiatives, they encounter a new frontier of security risk. For security managers building cloud security programs, it’s crucial to take a step back and ask: Does your current program truly cover the unique risks AI workloads bring?

NIS2 Action Plan for the Cloud CISO

NIS2 Action Plan for the Cloud CISO

The 555 Guide for Cloud Security Practitioners

The 555 Guide for Cloud Security Practitioners

The Sysdig 555 Benchmark for Cloud Detection and Response sets the standard for operating securely in the cloud, emphasizing the need for security teams to detect, triage, and respond to attacks within the average time it takes threat actors to conduct them: 10minutes.

Like what you see?