Blog page
extended Berkeley Packet Filter (eBPF) for Cloud Computing
Learn about eBPF and how it is used today in cloud computing
Read moreeBPF Insights Into Real-Time SSL/TLS Monitoring
Learn about how eBPF can help intercept and monitor SSL/TLS encrypted traffic
Read moreCrowdStrike: A Wake-Up Call for eBPF-Based Endpoint Security
Learn about the underlying causes of the adverse impact of cybersecurity attacks on organizations and how eBPF can help tackle these attacks
Read moreCould eBPF Save Us From CrowdStrike-Style Disasters?
The New Stack discusses the potential of eBPF to provide deep visibility into system operations, thereby helping to prevent and mitigate security incidents similar to the CrowdStrike outage
Read moreA look inside the BPF verifier
Learn about the BPF verifier and how it works
Read moreComparing eBPF and Kernel Modules for Application Vulnerability Detection and Attack Monitoring
A comparison between eBPF and Kernel modules across various factors, assessing their viability as a context capture tool for application security vulnerability detection and attack monitoring purposes
Read moreNo More Blue Fridays
Brendan Gregg discusses the recent Windows outage caused by a kernel update and advocates for eBPF to prevent such crashes, enhancing software reliability in Linux and Windows
Read moreRecent CrowdStrike Outage Emphasizes the Need for eBPF-Based Sensors
Global IT disruption caused by a Windows security update fuels debate on adopting eBPF for more resilient endpoint protection
Read moreRecent Crowdstrike Outage Emphasizes the Need for Less Intrusive Malware Behavior Detection Technologies
CrowdStrike outage sparks debate on Windows security, highlighting eBPF's absence and the need for less intrusive alternatives to kernel drivers
Read moreeBPF use cases
Dive deep into the intricacies of eBPF, unraveling its capabilities and exploring its seamless integration within the Kubernetes landscape
Read more