Browse all content by asset type.
Introducing the Sysdig open source community

DEFENSE REPORT
AI Helps Teams Reduce MTTR by 76%
Sysdig named representative vendor in Gartner Market Guide for CNAPP
Blog Posts

2025 Gartner® CNAPP Market Guide: Runtime visibility is no longer optional

Threat hunting with Sysdig: Uncovering “IngressNightmare”

Open Source Spotlight: From alerts to action with AI-powered Falco Vanguard
Briefs

4 Ways Sysdig Enables Value with Cloud and Container Adoption
Learn about four pillars of business value Sysdig brings to cloud and container security.

6 Key Challenges for CISOs in Financial Services
As cloud migration gathers pace with financial services (finserv) and banking firms, security leaders face a balancing act. How do you deal with complex cloud security and compliance challenges without slowing down the development of products that deliver growth?
Case Studies
BigCommerce Achieves Real-Time Cloud Security
With Sysdig Secure, organizations were able to quickly scan their containers for impacted images and discern their risk in less than five minutes.
Healthcare IT Provider Cuts Alerts by 99.8%, Reduces Vulnerability Noise by 98%
Healthcare IT Provider boosts compliance automation by 75%, detects threats in real time & reduces audit prep by 80%
Loglass Scales Compliance to Secure Cloud Growth with Sysdig
Loglass accelerates cloud security and compliance on AWS in weeks, gains real-time risk visibility & AI guidance
Ebooks

Top 6 Use Cases for Monitoring Cloud-Native Workloads with Sysdig Monitor

Securing the Cloud: The Benefits of Falco with an Enterprise Experience
An ebook with 3 mini case studies heavily featuring Falco and how it works with Sysdig, plus a callout to Falco Feeds at the end.
Guides

Cloud Security for Google Cloud
This guide outlines key requirements and capabilities for establishing comprehensive security for Google Cloud services and containers.

Cloud Security for Amazon Web Services
This guide outlines key requirements and capabilities for establishing comprehensive security for AWS cloud services and containers.

Secure Your Cloud in Minutes - Your Checklist for Meeting the 555 Benchmark
Sysdig’s 555 Benchmark for Cloud Detection and Response offers a standard to use when measuring how fast your security teams can counter attackers. Specifically, the benchmark finds that to outpace attacks, your security teams need to detect threats within 5 seconds, correlate and triage data within the first 5 minutes, and initiate a tactical response within the next 5 minutes.Sysdig’s 555 Benchmark for Cloud Detection and Response offers a standard to use when measuring how fast your security teams can counter attackers. Specifically, the benchmark finds that to outpace attacks, your security teams need to detect threats within 5 seconds, correlate and triage data within the first 5 minutes, and initiate a tactical response within the next 5 minutes.
Infographics
7 Cloud Security Requirements for Financial Service Providers
Learn the seven requirements financial services (finserv) firms and banks should meet to stay compliant and stop breaches.
Top 10 Metrics In PostgreSQL monitoring with Prometheus
Learn the top 10 metrics in PostgreSQL monitoring, with alert examples, both for PostgreSQL instances in Kubernetes and AWS RDS!
PromQL Cheatsheet
Prometheus is a monitoring and alerting system with a text based metric format, a multidimensional data model and a powerful query language. It’s now widely used and is the de facto standard for monitoring kubernetes. Metrics can be pulled from different sources, known as 'targets'. Download the PromQL Cheatsheet to see examples of popular functions and selectors.
Podcasts
Exploring Advanced Cybersecurity with Michael Isbitski
"Cybersecurity leader Mike Isbitski explores the intricacies of cloud-native security and vulnerability management in today's technological landscape. With over 25 years of experience, he provides valuable insights into the challenges and complexities organizations face in securing ephemeral infrastructure and machine identities in the cloud. This episode also explores the cautious adoption of AI in cybersecurity, emphasizing the need for a balanced approach that maintains operational functionality while addressing evolving security concerns."
Screaming in the Cloud: Benchmarking Security Attack Response Times in the Age of Automation with Anna Belak
"Anna Belak, Director of the Office of Cybersecurity Strategy at Sysdig, joins Corey on Screaming in the Cloud to discuss the newest benchmark for responding to security threats, 5/5/5. Anna describes why it was necessary to set a new benchmark for responding to security threats in a timely manner, and how the Sysdig team did research to determine the best practices for detecting, correlating, and responding to potential attacks. Corey and Anna discuss the importance of focusing on improving your own benchmarks towards a goal, as well as how prevention and threat detection are both essential parts of a solid security program."
Screaming in the Cloud: An Open-Source Mindset in Cloud Security with Alex Lawrence
"Alex Lawrence, Field CISO at Sysdig, joins Corey Quinn on Screaming in the Cloud to discuss how he went from studying bioluminescence and mycology to working in tech, and his stance on why open source is the future of cloud security."
Press Releases

Sysdig Unveils the Industry’s First Agentic Cloud Security Platform
With semantic analysis powered by autonomous AI agents, Sysdig Sage™ surfaces critical business risks and helps organizations fix them at the source in minutes

Sysdig Launches Open Source Community to Unite and Empower Millions of Cloud Security Innovators and Builders of All Levels
The company’s new forum establishes a place where Falco, Wireshark, Stratoshark, and sysdig OSS users can connect, collaborate, and growSAN…

Sysdig Launches the First Fully Integrated AI Analyst for Cloud Security
With AI-driven precision across prevention, detection, investigation, and response, Sysdig Sage™ equips teams to outpace cloud threats in real timeSAN…
Reports

Sysdig 2024 Cloud-Native Security and Usage Report

Cloud Detection and Response: Market Growth as an Enterprise Requirement - July 2023
To gain further insight into these trends, TechTarget’s Enterprise Strategy Group (ESG) surveyed 393 IT and cybersecurity professionals at organizations in North America (US and Canada) responsible for evaluating or purchasing cloud security technology products and services.

2023 Global Cloud Threat Report
The 2023 Global Cloud Threat Report exposes the latest security threats to public clouds, containers, Kubernetes, and cloud-native apps, based on extensive research by the Sysdig Threat Research Team (TRT).
Videos
Detecting Threats to Kubernetes, Containers, and Google Cloud
See how Sysdig helps secure and accelerate innovation with Google Cloud.
Secure DevOps Practices at Yahoo Japan
With more than 3,000 developers and a large Kubernetes environment, learn how Yahoo Japan is preventing cyber-attacks and unauthorized access by introducing appropriate security measures for the container environment.
Securing and Monitoring AWS Container Services
Developers, operations, and security teams must work together to address key workflows to secure and monitor containers, Kubernetes and cloud services across...
Webinars
.png)
Break the Bot: The Ultimate AI Challenge
Join us Aug 13 for an exclusive, hands-on demonstration of Sysdig's latest AI security innovations. Our new demo, Break the Bot: The Ultimate AI Challenge, gives you a front-row seat to the real-world risks AI introduces—and how Sysdig stops attackers in their tracks.
.png)
Packets, Pods & Prompts: Why Open Source is the Future of Cloud Security
Join this exclusive conversation with three titans of open source—the minds behind Falco, Wireshark, and Kubernetes—as they explore why open-source models are not just resilient, but essential to the next wave of cloud security.

From EDR to CNAPP
As the cloud-native ecosystem evolves, so do its security demands. Traditional EDR and vulnerability management tools fall short in environments where workloads are dynamic, and constantly scaling.
Whitepapers

A Comprehensive Approach to Cloud Threat Detection and Response
In this paper, we make a strong case that organizations need both agent-based and agentless monitoring solutions to maximize visibility and control.
Sysdig Platform Architecture Guide
The Sysdig Secure DevOps platform embeds security, compliance, and monitoring into your DevOps workflow. It is the only unified container security and monitoring platform.
Six Keys For Scaling Prometheus
Prometheus has become the de-facto standard for DevOps and SRE teams to monitor Kubernetes workloads. Download this guide to learn the options and best practices for scaling Prometheus as the scope of your production Kubernetes deployment increases.