Telemetry to Tactics: Tetragon Through the Lens of the MITRE ATT&CK Framework
This blog post explores how to use the MITRE ATT&CK framework to transform the deep telemetry from Tetragon into clear, actionable insights about adversary behavior
This blog post explores how to use the MITRE ATT&CK framework to transform the deep telemetry from Tetragon into clear, actionable insights about adversary behavior
A getting started guide for first time contributors, with some advice also useful to more experienced contributors
Find all the Cilium talks at KubeCon NA 2024
In the second part of the series, explore various scenarios on how to use Cilium Cluster Mesh
Learn how Chereo implemented zero trust security in their cell-based architecture with Cilium and eBPF
Learn how Singlestore were able to detect dropped requests in their jupyter notebooks using Cilium Hubble
Cilium Tetragon 1.0 has arrived! marking a significant stride in Kubernetes security and observability, offering low-overhead, eBPF-driven runtime enforcement and monitoring
Find all the Cilium talks at KubeCon NA 2023
Learn from the Deezer team experience dealing with a Cilium misconfiguration on their production Kubernetes clusters and how they fixed it
This post discusses a keynote by Liz Rice at Kubernetes Community Days UK, introducing Cilium's Mutual Authentication feature powered by eBPF and notes Cilium's recent CNCF graduation, indicating its stability for production use
Learn more about Aditi and how she got involved with Cilium
Isovalent announce the release of Isovalent Enterprise for Cilium 1.14, highlighting its new Cilium Multi-Network feature, which allows a Kubernetes Pod to connect to multiple network interfaces without sacrificing security and observability
For live conversation and quick questions, join the Cilium Slack workspace. Don’t forget to say hi!
Join slack workspace