resources
 > Content library

Browse all content by asset type.

filter by:
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Blog Posts

Connecting runtime to source: Sysdig and Semgrep integration
No items found.

Connecting runtime to source: Sysdig and Semgrep integration

Christian Laffin
|
July 29, 2025
Fix what matters, faster: How Sysdig and Semgrep are unifying security without silos – from code to runtime
No items found.

Fix what matters, faster: How Sysdig and Semgrep are unifying security without silos – from code to runtime

Ryan Davis
|
July 29, 2025
Defending sensitive data with Sysdig Secure
Sysdig Features
Cloud Security

Defending sensitive data with Sysdig Secure

Dale Norris
|
July 28, 2025

Briefs

Sysdig and Google Cloud Brief

Sysdig and Google Cloud Brief

Learn how the Sysdig cloud security platform enables Google Cloud users to secure containers, Kubernetes, and cloud services.

Sysdig and AWS Brief

Sysdig and AWS Brief

To keep pace with dynamic environments built on containers, Kubernetes, and cloud services, cloud teams need a unified platform for visibility and security. Sysdig helps AWS users address their most critical security, compliance, and monitoring requirements to ship cloud applications faster on AWS Cloud. Click to learn more.

Sysdig Secure Product Brief

Sysdig Secure Product Brief

Sysdig Secure embeds security and compliance into the build, run, and respond stages of the Kubernetes lifecycle. Manage cloud security risk by integrating image scanning, compliance, runtime security, and incident response into your secure DevOps workflow. Click to learn more.

Case Studies

BigCommerce Achieves Real-Time Cloud Security

With Sysdig Secure, organizations were able to quickly scan their containers for impacted images and discern their risk in less than five minutes.

Healthcare IT Provider Cuts Alerts by 99.8%, Reduces Vulnerability Noise by 98%

Healthcare IT Provider boosts compliance automation by 75%, detects threats in real time & reduces audit prep by 80%

Loglass Scales Compliance to Secure Cloud Growth with Sysdig

Loglass accelerates cloud security and compliance on AWS in weeks, gains real-time risk visibility & AI guidance

Ebooks

Top 6 Use Cases for Monitoring Cloud-Native Workloads with Sysdig Monitor

Top 6 Use Cases for Monitoring Cloud-Native Workloads with Sysdig Monitor

Securing the Cloud: The Benefits of Falco with an Enterprise Experience

Securing the Cloud: The Benefits of Falco with an Enterprise Experience

An ebook with 3 mini case studies heavily featuring Falco and how it works with Sysdig, plus a callout to Falco Feeds at the end.

The Value of Sysdig's CNAPP

The Value of Sysdig's CNAPP

Guides

Cloud Security for Google Cloud

Cloud Security for Google Cloud

This guide outlines key requirements and capabilities for establishing comprehensive security for Google Cloud services and containers.

Cloud Security for Amazon Web Services

Cloud Security for Amazon Web Services

This guide outlines key requirements and capabilities for establishing comprehensive security for AWS cloud services and containers.

Secure Your Cloud in Minutes - Your Checklist for Meeting the 555 Benchmark

Secure Your Cloud in Minutes - Your Checklist for Meeting the 555 Benchmark

Sysdig’s 555 Benchmark for Cloud Detection and Response offers a standard to use when measuring how fast your security teams can counter attackers. Specifically, the benchmark finds that to outpace attacks, your security teams need to detect threats within 5 seconds, correlate and triage data within the first 5 minutes, and initiate a tactical response within the next 5 minutes.Sysdig’s 555 Benchmark for Cloud Detection and Response offers a standard to use when measuring how fast your security teams can counter attackers. Specifically, the benchmark finds that to outpace attacks, your security teams need to detect threats within 5 seconds, correlate and triage data within the first 5 minutes, and initiate a tactical response within the next 5 minutes.

Infographics

Unlock the Power of NIS2

Unlock the Power of NIS2

The Evolution of Modern Cloud Security

The Evolution of Modern Cloud Security

Remember asking your teachers why you needed to know history? They probably said that learning history is important in understanding how society has changed and progressed over time, and that we can learn from past experiences and mistakes.

The Grand Atlas of Software Security

The Grand Atlas of Software Security

This infographic demonstrates how to secure each stage of the software lifecycle, with a focus on the Shift Left approach, where early remediation reduces risks and costs.

Podcasts

Exploring Advanced Cybersecurity with Michael Isbitski

"Cybersecurity leader Mike Isbitski explores the intricacies of cloud-native security and vulnerability management in today's technological landscape. With over 25 years of experience, he provides valuable insights into the challenges and complexities organizations face in securing ephemeral infrastructure and machine identities in the cloud. This episode also explores the cautious adoption of AI in cybersecurity, emphasizing the need for a balanced approach that maintains operational functionality while addressing evolving security concerns."

Screaming in the Cloud: Benchmarking Security Attack Response Times in the Age of Automation with Anna Belak

"Anna Belak, Director of the Office of Cybersecurity Strategy at Sysdig, joins Corey on Screaming in the Cloud to discuss the newest benchmark for responding to security threats, 5/5/5. Anna describes why it was necessary to set a new benchmark for responding to security threats in a timely manner, and how the Sysdig team did research to determine the best practices for detecting, correlating, and responding to potential attacks. Corey and Anna discuss the importance of focusing on improving your own benchmarks towards a goal, as well as how prevention and threat detection are both essential parts of a solid security program."

Screaming in the Cloud: An Open-Source Mindset in Cloud Security with Alex Lawrence

"Alex Lawrence, Field CISO at Sysdig, joins Corey Quinn on Screaming in the Cloud to discuss how he went from studying bioluminescence and mycology to working in tech, and his stance on why open source is the future of cloud security."

Press Releases

Sysdig Launches Open Source Community to Unite and Empower Millions of Cloud Security Innovators and Builders of All Levels

Sysdig Launches Open Source Community to Unite and Empower Millions of Cloud Security Innovators and Builders of All Levels

The company’s new forum establishes a place where Falco, Wireshark, Stratoshark, and sysdig OSS users can connect, collaborate, and growSAN…

July 9, 2025
Sysdig Launches the First Fully Integrated AI Analyst for Cloud Security

Sysdig Launches the First Fully Integrated AI Analyst for Cloud Security

With AI-driven precision across prevention, detection, investigation, and response, Sysdig Sage™ equips teams to outpace cloud threats in real timeSAN…

June 25, 2025
Sysdig Donates Stratoshark to the Wireshark Foundation to Advance Open Source Cloud Security

Sysdig Donates Stratoshark to the Wireshark Foundation to Advance Open Source Cloud Security

Open source Falco — used by over 60% of the Fortune 500 — delivers real-time cloud threat detection. Stratoshark complements…

May 14, 2025

Reports

Sysdig 2024 Cloud-Native Security and Usage Report

Sysdig 2024 Cloud-Native Security and Usage Report

Cloud Detection and Response: Market Growth as an Enterprise Requirement - July 2023

Cloud Detection and Response: Market Growth as an Enterprise Requirement - July 2023

To gain further insight into these trends, TechTarget’s Enterprise Strategy Group (ESG) surveyed 393 IT and cybersecurity professionals at organizations in North America (US and Canada) responsible for evaluating or purchasing cloud security technology products and services.

2023 Global Cloud Threat Report

2023 Global Cloud Threat Report

The 2023 Global Cloud Threat Report exposes the latest security threats to public clouds, containers, Kubernetes, and cloud-native apps, based on extensive research by the Sysdig Threat Research Team (TRT).

Videos

Detecting Threats to Kubernetes, Containers, and Google Cloud

See how Sysdig helps secure and accelerate innovation with Google Cloud.

Secure DevOps Practices at Yahoo Japan

With more than 3,000 developers and a large Kubernetes environment, learn how Yahoo Japan is preventing cyber-attacks and unauthorized access by introducing appropriate security measures for the container environment.

Securing and Monitoring AWS Container Services

Developers, operations, and security teams must work together to address key workflows to secure and monitor containers, Kubernetes and cloud services across...

Webinars

Break the Bot: The Ultimate AI Challenge

Break the Bot: The Ultimate AI Challenge

Join us Aug 13 for an exclusive, hands-on demonstration of Sysdig's latest AI security innovations. Our new demo, Break the Bot: The Ultimate AI Challenge, gives you a front-row seat to the real-world risks AI introduces—and how Sysdig stops attackers in their tracks.

Aug 13, 2025 11 am CEST | 10am BST
Packets, Pods & Prompts: Why Open Source is the Future of Cloud Security

Packets, Pods & Prompts: Why Open Source is the Future of Cloud Security

Join this exclusive conversation with three titans of open source—the minds behind Falco, Wireshark, and Kubernetes—as they explore why open-source models are not just resilient, but essential to the next wave of cloud security.

From EDR to CNAPP

From EDR to CNAPP

As the cloud-native ecosystem evolves, so do its security demands. Traditional EDR and vulnerability management tools fall short in environments where workloads are dynamic, and constantly scaling.

Jul 16, 2025 1PM CEST | 12PM BST

Whitepapers

Securing AI: Navigating a New Frontier of Security Risk

Organizations worldwide are turning to artificial intelligence (AI) to gain insights, optimize operations, and remain competitive in an increasingly digitized economy. As businesses move workloads to cloud‑native environments to support these AI initiatives, they encounter a new frontier of security risk. For security managers building cloud security programs, it’s crucial to take a step back and ask: Does your current program truly cover the unique risks AI workloads bring?

NIS2 Action Plan for the Cloud CISO

The 555 Guide for Cloud Security Practitioners

The Sysdig 555 Benchmark for Cloud Detection and Response sets the standard for operating securely in the cloud, emphasizing the need for security teams to detect, triage, and respond to attacks within the average time it takes threat actors to conduct them: 10minutes.

Like what you see?