resources
 > Content library

Browse all content by asset type.

filter by:
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Blog Posts

2025 Gartner® CNAPP Market Guide: Runtime visibility is no longer optional
2025 Gartner® CNAPP Market Guide: Runtime visibility is no longer optional
No items found.

2025 Gartner® CNAPP Market Guide: Runtime visibility is no longer optional

Chris Petty
|
August 7, 2025
Threat hunting with Sysdig: Uncovering “IngressNightmare”
Threat hunting with Sysdig: Uncovering “IngressNightmare”
Cloud Security

Threat hunting with Sysdig: Uncovering “IngressNightmare”

David Huckaby
|
August 6, 2025
Open Source Spotlight: From alerts to action with AI-powered Falco Vanguard
Open Source Spotlight: From alerts to action with AI-powered Falco Vanguard
Cloud Security

Open Source Spotlight: From alerts to action with AI-powered Falco Vanguard

Mike Watson and Miguel De Los Santos
|
August 6, 2025

Briefs

BRIEF. 2025 Cloud‐Native Security and Usage Report
BRIEF. 2025 Cloud‐Native Security and Usage Report

BRIEF. 2025 Cloud‐Native Security and Usage Report

This is a special edition of Sysdig’s 2025 Cloud-Native Security and Usage Report, providing only the usage and analysis of the open source detection tool, Falco.

BRIEF. Top 5 Best Practices For Image Scanning
BRIEF. Top 5 Best Practices For Image Scanning

BRIEF. Top 5 Best Practices For Image Scanning

How do you manage container security risk without slowing down application delivery?

5 best practices for securing AWS cloud and containers
5 best practices for securing AWS cloud and containers

5 best practices for securing AWS cloud and containers

Learn how to automate efficient security and compliance controls in Amazon Web Services (AWS). Secure and accelerate your cloud innovation on AWS with five best practices for cloud and container security.

Case Studies

BigCommerce Achieves Real-Time Cloud Security

BigCommerce Achieves Real-Time Cloud Security

With Sysdig Secure, organizations were able to quickly scan their containers for impacted images and discern their risk in less than five minutes.

Healthcare IT Provider Cuts Alerts by 99.8%, Reduces Vulnerability Noise by 98%

Healthcare IT Provider Cuts Alerts by 99.8%, Reduces Vulnerability Noise by 98%

Healthcare IT Provider boosts compliance automation by 75%, detects threats in real time & reduces audit prep by 80%

Loglass Scales Compliance to Secure Cloud Growth with Sysdig

Loglass Scales Compliance to Secure Cloud Growth with Sysdig

Loglass accelerates cloud security and compliance on AWS in weeks, gains real-time risk visibility & AI guidance

Ebooks

Top 6 Use Cases for Monitoring Cloud-Native Workloads with Sysdig Monitor
Top 6 Use Cases for Monitoring Cloud-Native Workloads with Sysdig Monitor

Top 6 Use Cases for Monitoring Cloud-Native Workloads with Sysdig Monitor

Securing the Cloud: The Benefits of Falco with an Enterprise Experience
Securing the Cloud: The Benefits of Falco with an Enterprise Experience

Securing the Cloud: The Benefits of Falco with an Enterprise Experience

An ebook with 3 mini case studies heavily featuring Falco and how it works with Sysdig, plus a callout to Falco Feeds at the end.

The Value of Sysdig's CNAPP
The Value of Sysdig's CNAPP

The Value of Sysdig's CNAPP

Guides

Cloud Security for Google Cloud
Cloud Security for Google Cloud

Cloud Security for Google Cloud

This guide outlines key requirements and capabilities for establishing comprehensive security for Google Cloud services and containers.

Cloud Security for Amazon Web Services
Cloud Security for Amazon Web Services

Cloud Security for Amazon Web Services

This guide outlines key requirements and capabilities for establishing comprehensive security for AWS cloud services and containers.

Secure Your Cloud in Minutes - Your Checklist for Meeting the 555 Benchmark
Secure Your Cloud in Minutes - Your Checklist for Meeting the 555 Benchmark

Secure Your Cloud in Minutes - Your Checklist for Meeting the 555 Benchmark

Sysdig’s 555 Benchmark for Cloud Detection and Response offers a standard to use when measuring how fast your security teams can counter attackers. Specifically, the benchmark finds that to outpace attacks, your security teams need to detect threats within 5 seconds, correlate and triage data within the first 5 minutes, and initiate a tactical response within the next 5 minutes.Sysdig’s 555 Benchmark for Cloud Detection and Response offers a standard to use when measuring how fast your security teams can counter attackers. Specifically, the benchmark finds that to outpace attacks, your security teams need to detect threats within 5 seconds, correlate and triage data within the first 5 minutes, and initiate a tactical response within the next 5 minutes.

Infographics

7 Cloud Security Requirements for Financial Service Providers
7 Cloud Security Requirements for Financial Service Providers

7 Cloud Security Requirements for Financial Service Providers

Learn the seven requirements financial services (finserv) firms and banks should meet to stay compliant and stop breaches.

Top 10 Metrics In PostgreSQL monitoring with Prometheus
Top 10 Metrics In PostgreSQL monitoring with Prometheus

Top 10 Metrics In PostgreSQL monitoring with Prometheus

Learn the top 10 metrics in PostgreSQL monitoring, with alert examples, both for PostgreSQL instances in Kubernetes and AWS RDS!

PromQL Cheatsheet
PromQL Cheatsheet

PromQL Cheatsheet

Prometheus is a monitoring and alerting system with a text based metric format, a multidimensional data model and a powerful query language. It’s now widely used and is the de facto standard for monitoring kubernetes. Metrics can be pulled from different sources, known as 'targets'. Download the PromQL Cheatsheet to see examples of popular functions and selectors.

Podcasts

Exploring Advanced Cybersecurity with Michael Isbitski

Exploring Advanced Cybersecurity with Michael Isbitski

"Cybersecurity leader Mike Isbitski explores the intricacies of cloud-native security and vulnerability management in today's technological landscape. With over 25 years of experience, he provides valuable insights into the challenges and complexities organizations face in securing ephemeral infrastructure and machine identities in the cloud. This episode also explores the cautious adoption of AI in cybersecurity, emphasizing the need for a balanced approach that maintains operational functionality while addressing evolving security concerns."

Screaming in the Cloud: Benchmarking Security Attack Response Times in the Age of Automation with Anna Belak

Screaming in the Cloud: Benchmarking Security Attack Response Times in the Age of Automation with Anna Belak

"Anna Belak, Director of the Office of Cybersecurity Strategy at Sysdig, joins Corey on Screaming in the Cloud to discuss the newest benchmark for responding to security threats, 5/5/5. Anna describes why it was necessary to set a new benchmark for responding to security threats in a timely manner, and how the Sysdig team did research to determine the best practices for detecting, correlating, and responding to potential attacks. Corey and Anna discuss the importance of focusing on improving your own benchmarks towards a goal, as well as how prevention and threat detection are both essential parts of a solid security program."

Screaming in the Cloud: An Open-Source Mindset in Cloud Security with Alex Lawrence

Screaming in the Cloud: An Open-Source Mindset in Cloud Security with Alex Lawrence

"Alex Lawrence, Field CISO at Sysdig, joins Corey Quinn on Screaming in the Cloud to discuss how he went from studying bioluminescence and mycology to working in tech, and his stance on why open source is the future of cloud security."

Press Releases

Sysdig Unveils the Industry’s First Agentic Cloud Security Platform
Sysdig Unveils the Industry’s First Agentic Cloud Security Platform

Sysdig Unveils the Industry’s First Agentic Cloud Security Platform

With semantic analysis powered by autonomous AI agents, Sysdig Sage™ surfaces critical business risks and helps organizations fix them at the source in minutes

August 5, 2025
Sysdig Launches Open Source Community to Unite and Empower Millions of Cloud Security Innovators and Builders of All Levels
Sysdig Launches Open Source Community to Unite and Empower Millions of Cloud Security Innovators and Builders of All Levels

Sysdig Launches Open Source Community to Unite and Empower Millions of Cloud Security Innovators and Builders of All Levels

The company’s new forum establishes a place where Falco, Wireshark, Stratoshark, and sysdig OSS users can connect, collaborate, and growSAN…

July 9, 2025
Sysdig Launches the First Fully Integrated AI Analyst for Cloud Security
Sysdig Launches the First Fully Integrated AI Analyst for Cloud Security

Sysdig Launches the First Fully Integrated AI Analyst for Cloud Security

With AI-driven precision across prevention, detection, investigation, and response, Sysdig Sage™ equips teams to outpace cloud threats in real timeSAN…

June 25, 2025

Reports

2022 Cloud-Native Security and Usage Report
2022 Cloud-Native Security and Usage Report

2022 Cloud-Native Security and Usage Report

Sysdig 2022 Cloud-Native Security and Usage Report digs into how Sysdig customers of all sizes and industries are using and securing cloud and container environments. We examined the data and found some interesting trends this year that may help as you work to develop best practices for securing and monitoring your cloud-native environments.

SANS 2021 Cloud Security Survey
SANS 2021 Cloud Security Survey

SANS 2021 Cloud Security Survey

The goal of the SANS 2021 Cloud Security Survey is to provide additional insight into how organizations are using the cloud today, the threats security teams are facing in the cloud, and what they’re doing to improve security posture in the cloud.

2021 Container Security and Usage Report
2021 Container Security and Usage Report

2021 Container Security and Usage Report

For the past four years, we’ve provided insights into container usage through real-time, real-world customer data. In this report, you will find further detail about security, compliance, services, alerting, and Kubernetes usage patterns. This information can be useful for determining the real-world state of security and usage for container environments at companies around the world, from a broad range of industries.

Videos

Detecting Threats to Kubernetes, Containers, and Google Cloud

Detecting Threats to Kubernetes, Containers, and Google Cloud

See how Sysdig helps secure and accelerate innovation with Google Cloud.

Secure DevOps Practices at Yahoo Japan

Secure DevOps Practices at Yahoo Japan

With more than 3,000 developers and a large Kubernetes environment, learn how Yahoo Japan is preventing cyber-attacks and unauthorized access by introducing appropriate security measures for the container environment.

Securing and Monitoring AWS Container Services

Securing and Monitoring AWS Container Services

Developers, operations, and security teams must work together to address key workflows to secure and monitor containers, Kubernetes and cloud services across...

Webinars

Code to Cloud Security with Checkmarx and Sysdig
Code to Cloud Security with Checkmarx and Sysdig

Code to Cloud Security with Checkmarx and Sysdig

Learn how to meet the security challenges of modern application development with containers.

Mar 11, 2025 9am Pacific | 12pm Eastern
OWASP K8s Top 10 Projects: What Risks You Need to Prioritize
OWASP K8s Top 10 Projects: What Risks You Need to Prioritize

OWASP K8s Top 10 Projects: What Risks You Need to Prioritize

Instructor Led Training
Instructor Led Training

Instructor Led Training

January 21, 2025 3 pm GST

Whitepapers

Securing AI: Navigating a New Frontier of Security Risk

Securing AI: Navigating a New Frontier of Security Risk

Organizations worldwide are turning to artificial intelligence (AI) to gain insights, optimize operations, and remain competitive in an increasingly digitized economy. As businesses move workloads to cloud‑native environments to support these AI initiatives, they encounter a new frontier of security risk. For security managers building cloud security programs, it’s crucial to take a step back and ask: Does your current program truly cover the unique risks AI workloads bring?

NIS2 Action Plan for the Cloud CISO

NIS2 Action Plan for the Cloud CISO

The 555 Guide for Cloud Security Practitioners

The 555 Guide for Cloud Security Practitioners

The Sysdig 555 Benchmark for Cloud Detection and Response sets the standard for operating securely in the cloud, emphasizing the need for security teams to detect, triage, and respond to attacks within the average time it takes threat actors to conduct them: 10minutes.

Like what you see?