newsroom

Read our most recent press releases, product launches, and company stories

Leading The Defense Against Cyber Attacks On The Cloud
News
9/19/2025

Leading The Defense Against Cyber Attacks On The Cloud

view source
Leading The Defense Against Cyber Attacks On The Cloud
press release

Sysdig Unveils the Industry’s First Agentic Cloud Security Platform

Read More
Sysdig Unveils the Industry’s First Agentic Cloud Security Platform
blog

Understanding CVE-2025-49844: “RediShell” Critical Remote Code Execution in Redis

Read More
Understanding CVE-2025-49844: “RediShell” Critical Remote Code Execution in Redis
browse complete library
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Sysdig – A Tool to Capture Linux System State and Activities
News
9/23/2014
Adrian Dinu, Linoxide

Sysdig – A Tool to Capture Linux System State and Activities

view source
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Amid Global Expansion and >330% Growth of Sysdig Sage™ AI, Sysdig Appoints Gary Olson CRO and Crendal Kear CBO
press release
3/13/2025

Amid Global Expansion and >330% Growth of Sysdig Sage™ AI, Sysdig Appoints Gary Olson CRO and Crendal Kear CBO

Sysdig Usage Report Reveals that Machine Identities Outnumber Humans 40,000 to 1, Presenting a Major Challenge to Enterprise Security
press release
3/12/2025

Sysdig Usage Report Reveals that Machine Identities Outnumber Humans 40,000 to 1, Presenting a Major Challenge to Enterprise Security

Sysdig Unveils Stratoshark, Enabling Millions of Network Professionals to Bring Their Security Experience to the Cloud
press release
1/22/2025

Sysdig Unveils Stratoshark, Enabling Millions of Network Professionals to Bring Their Security Experience to the Cloud

Sysdig Named Customers’ Choice in Gartner® “Voice of the Customer” CNAPP Report
press release
1/6/2025

Sysdig Named Customers’ Choice in Gartner® “Voice of the Customer” CNAPP Report

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
How to secure Kubernetes deployment with signature verification
BLOGS
7/12/2022

How to secure Kubernetes deployment with signature verification

Detecting suspicious activity on AWS using cloud logs
BLOGS
7/11/2022

Detecting suspicious activity on AWS using cloud logs

How attackers use exposed Prometheus server to exploit Kubernetes clusters
BLOGS
7/5/2022

How attackers use exposed Prometheus server to exploit Kubernetes clusters

Adapting security to Amazon EKS Anywhere on Bare Metal
BLOGS
6/30/2022

Adapting security to Amazon EKS Anywhere on Bare Metal

Like what you see?