Telemetry to Tactics: Tetragon Through the Lens of the MITRE ATT&CK Framework
This blog post explores how to use the MITRE ATT&CK framework to transform the deep telemetry from Tetragon into clear, actionable insights about adversary behavior
This blog post explores how to use the MITRE ATT&CK framework to transform the deep telemetry from Tetragon into clear, actionable insights about adversary behavior
A getting started guide for first time contributors, with some advice also useful to more experienced contributors
Find all the Cilium talks at KubeCon NA 2024
Explore how Azure Kubernetes Service (AKS) leverages FQDN filtering through Advanced Container Networking Services (ACNS) and Cilium to enhance your cluster’s security
Learn how to easily migrate from Flannel to Cilium
Learn how to use Cilium Network Policies to secure your pods in this star wars themed blog post
Learn how Koyeb achieved 70% faster deployments and a high-performance private network with Cilium and Envoy
Explore the technical depth of Tetragon, its core features, real-world use cases, how eBPF transforms security monitoring, and best practices for deploying Tetragon in Kubernetes environments
Learn how to get Cilium running on your AKS cluster
Explore how to set up and optimize Cilium Cluster Mesh across multiple Kubernetes clusters
Learn how the ICOS project leverages Cilium and Tetragon to create comprehensive audit reports in its security audit tool
In part 3 of the series, you'll learn how Hubble's rich observability data can be used to enhance your Kubernetes network security posture
For live conversation and quick questions, join the Cilium Slack workspace. Don’t forget to say hi!
Join slack workspace