-
Notifications
You must be signed in to change notification settings - Fork 125
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
9d49508
commit b6ac83f
Showing
10 changed files
with
45 additions
and
0 deletions.
There are no files selected for viewing
9 changes: 9 additions & 0 deletions
9
content/blog-posts/2024-04-30-how-is-k8s-network-security-evolving/index.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
--- | ||
date: '2024-04-30T17:20:05.000Z' | ||
title: 'How is Kubernetes Network Security Evolving?' | ||
ogImage: ogimage.png | ||
description: "In this podcast, Liz Rice spoke on Cilium, Tetragon and eBPF's impact in network security" | ||
externalUrl: 'https://www.cloudsecuritypodcast.tv/videos/how-is-kubernetes-network-security-evolving' | ||
categories: | ||
- Community | ||
--- |
Binary file added
BIN
+44.8 KB
content/blog-posts/2024-04-30-how-is-k8s-network-security-evolving/ogimage.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
--- | ||
date: '2024-05-09T17:20:05.000Z' | ||
title: 'Getting started with Aya and eBPF Part 1' | ||
ogImage: ogimage.png | ||
description: 'The first part in a series of posts exploring eBPF and the Rust Aya crate' | ||
externalUrl: 'https://medium.com/@stevelatif/aya-rust-tutorial-part-one-6e1d02fe5ff2' | ||
categories: | ||
- Technology | ||
--- |
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
--- | ||
date: '2024-05-15T17:20:05.000Z' | ||
title: 'Optimizing Local Socket Communication: SOCKMAP and eBPF' | ||
ogImage: ogimage.png | ||
description: 'A detailed overview of how SOCKMAP works in conjunction with eBPF to splice sockets, allowing for streamlined communication between different network namespaces or within a single namespace' | ||
externalUrl: 'https://levelup.gitconnected.com/optimizing-local-socket-communication-sockmap-and-ebpf-0edf1a1cea3c' | ||
categories: | ||
- Technology | ||
--- |
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
9 changes: 9 additions & 0 deletions
9
content/blog-posts/2024-05-17-ebpf-financial-systems/index.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
--- | ||
date: '2024-05-17T17:20:05.000Z' | ||
title: 'Detecting Advanced Persistent Threats (APTs) in Financial Systems with eBPF' | ||
ogImage: ogimage.png | ||
description: 'Explore how eBPF enhances security in Kubernetes for financial systems by detecting Advanced Persistent Threats (APTs)' | ||
externalUrl: 'https://kubelog.io/detecting-advanced-persistent-threats-in-financial-systems-with-ebpf/' | ||
categories: | ||
- Technology | ||
--- |
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
--- | ||
date: '2024-05-17T17:20:05.000Z' | ||
title: 'Tetragon Process Lifecycle Observation: eBPF Part' | ||
ogImage: ogimage.webp | ||
description: 'Learn how Tetragon detects process creation and termination using eBPF' | ||
externalUrl: 'https://yuki-nakamura.com/2024/05/17/tetragon-process-lifecycle-observation-ebpf-part/' | ||
categories: | ||
- Technology | ||
--- |
Binary file not shown.