How is eBPF impacting Kubernetes Network Security? In this episode, recorded LIVE at Kubecon EU Paris 2024, Liz Rice, Chief Open Source Officer at Isovalent took us through the technical nuances of eBPF and its role in enabling dynamic, efficient network policies that go beyond traditional security measures. She also discusses Tetragon, the new subproject under Cilium, designed to enhance runtime security with deeper forensic capabilities. A great conversation for anyone involved in Kubernetes workload management, offering a peek into the future of cloud-native technologies and the evolving landscape of network security.
Guest Socials: Liz's Linkedin
Podcast Twitter - @CloudSecPod
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security Podcast- Youtube
- Cloud Security Newsletter
- Cloud Security BootCamp
Questions asked:
(00:00) Introduction
(01:46) A bit about Liz Rice
(02:11) What is eBPF and Cilium?
(03:24) SC Linux vs eBPF
(04:11) Business use case for Cilium
(06:37) Cilium vs Cloud Managed Services
(08:51) Why was there a need for Tetragon?
(11:20) Business use case for Tetragon
(11:32) Projects related to Multi-Cluster Deployment
(12:45) Where can you learn more about eBPF and Tetragon
(13:50) Hot Topics from Kubecon EU 2024
(15:07) The Fun Section
(15:35) How has Kubecon changed over the years?
Resources spoken about during the interview:
Cilium
Tetragon
eBPF
CISO Perspective: Sean Catlett, CISO of Slack
CAASM - CyberSecurity Asset Management for the Modern Security Stack
Azure Security Fundamentals - Level 200
Confidential Computing in Azure Explained
Azure Cloud Security Architecture
Azure Security Fundamentals Level 1
Finding Security Holes in Azure Services
Azure Kubernetes Service (AKS) Security Explained
Azure Security Fundamentals - Zero Trust with Azure AD
How to Secure Cloud Managed Kubernetes
Kubernetes Security Best Practices in 2022
Manage Privileged Access for Kubernetes & Cloud
How to become a Cloud Native Security Engineer
Service Mesh Security EXPLAINED!
Scaling a Practical AWS Asset Management Program
Threat Hunting in AWS
What is SBOM, iBOM?
Security for AI/ML Models in AWS
Building Google Cloud Security Products
Google Cloud Security Fundamentals - Level 2
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast