Top Kubernetes Security Use Cases: Tetragon and eBPF
What’s Next?
Join the creators of eBPF, Cilium and Tetragon to learn about your cloud native journey with Isovalent Cilium Enterprise.
eBPF & Tetragon: Tools for detecting XZ Utils CVE 2024-3094 Exploit
In this blog we dissect the technicalities of the exploit throughout the different attack stages. Discover how using Tetragon, an eBPF-based runtime security product, we provide a working solution to detect the XZ backdoor in OpenSSH.
Read blogMastering Cilium for Kubernetes Compliance
Read the Cilium white paper from Isovalent and ControlPlane, solving NIST and other compliance frameworks in cloud-native environments.
Read whitepaperGetting Started with Tetragon
Try our hands-on lab to learn how you can use Tetragon to gain real-time visibility into Kubernetes and help secure your production environment.
Start lab