How is eBPF impacting Kubernetes Network Security? In this episode, recorded LIVE at Kubecon EU Paris 2024, Liz Rice, Chief Open Source Officer at Isovalent took us through the technical nuances of eBPF and its role in enabling dynamic, efficient network policies that go beyond traditional security measures. She also discusses Tetragon, the new subproject under Cilium, designed to enhance runtime security with deeper forensic capabilities. A great conversation for anyone involved in Kubernetes workload management, offering a peek into the future of cloud-native technologies and the evolving landscape of network security.
Guest Socials: Liz's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(01:46) A bit about Liz Rice
(02:11) What is eBPF and Cilium?
(03:24) SC Linux vs eBPF
(04:11) Business use case for Cilium
(06:37) Cilium vs Cloud Managed Services
(08:51) Why was there a need for Tetragon?
(11:20) Business use case for Tetragon
(11:32) Projects related to Multi-Cluster Deployment
(12:45) Where can you learn more about eBPF and Tetragon
(13:50) Hot Topics from Kubecon EU 2024
(15:07) The Fun Section
(15:35) How has Kubecon changed over the years?
Resources spoken about during the interview:
Cilium
Tetragon
eBPF
Understand Your Cloud Security Landscape to cut through the noise!
Kubernetes Security Trends 2024 | Software Supply Chain Security, Zero Trust and AI
Kubernetes Network Security for Multi Tenancy
AWS reInvent 2023 - Security highlights and announcements
eBPF - Kubernetes Network Security without the Blind Sides!
Attack Path Analysis for Better Kubernetes Security
Secure your SaaS applications like this!
Threat Detection for not so Common Cloud Services
How to Escape Clusters in a Managed Kubernetes Cluster?
Have I lost my Secrets?
How to become a Senior Cloud Security Engineer?
5 Skills to Level Up Your Cloud Hacking
Become a Cloud Native CISO in 2023
Software Supply Chain Controls for Terraform
Data Security RoadMap in 2023
The Cloud to Code Dilemma - Let's Talk
CISO Perspective: Josh Lemos, CISO of Gitlab
The Azure Cloud Security Pentesting Skills You NEED!
How to detect software supply chain attacks with Honeytokens?
Google Cloud Security Pentesting Methodology
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast