Telemetry to Tactics: Tetragon Through the Lens of the MITRE ATT&CK Framework
This blog post explores how to use the MITRE ATT&CK framework to transform the deep telemetry from Tetragon into clear, actionable insights about adversary behavior
This blog post explores how to use the MITRE ATT&CK framework to transform the deep telemetry from Tetragon into clear, actionable insights about adversary behavior
A getting started guide for first time contributors, with some advice also useful to more experienced contributors
Find all the Cilium talks at KubeCon NA 2024
Plongez dans les principales fonctionnalités et améliorations du nouveau cilium 1.14
Dive into some of the features and functionality in the Cilium 1.14 release, starting by installing Cilium, then working through deny policy and debugging with Hubble
Learn about the overlayfs upstream vulnerability in the kernel and how to prevent the escalation of the vulnerability using Tetragon
Delve into how Cilium can be used alongside the security groups for EKS pods in supported clusters when running in chaining mode
Learn how the AKS-managed kube-proxy DaemonSet can be disabled to support BYOCNI (Bring your own CNI) and install Cilium as the CNI
Dive into an interview with Roland Wolters, Head of Technical Marketing at Isovalent, to find out more about the new Cilium 1.14 release and the community
Learn how to configure Cilium to supply Load Balancer service support in Kubernetes
Learn about some of the most exciting features in the Cilium 1.14 release
Explore the reasons why Trendyol chose Cilium and the value they received from it
For live conversation and quick questions, join the Cilium Slack workspace. Don’t forget to say hi!
Join slack workspace