
eBPF versus Kernel Extensions
Recent events in the world of cybersecurity have brought an influx of attention to a technology known as kernel extensions, and the serious risks that can arise when third-party programs that utilize this technology experience bugs and incompatibilities. So today, we thought it would be useful to dive into the two main approaches for building “agents” or […]

Leveraging eBPF for DevSecOps
eBPF is a revolutionary technology, originating from the Linux kernel. It is used to safely and efficiently extend the capabilities of the kernel without requiring changing the kernel source code or loading kernel modules/extensions. Today, eBPF is used extensively to: eBPF-Enriched Context eBPF is the base data layer that is needed in runtime cloud security. […]

What is Shift-Right Security?
A look at the need for a shift-right security approach that includes runtime detection and response.

The Evolution of EDR and CWPP
An in-depth look at the evolution of EDR, CWPP and CDR and their role in security organizations, evolving from endpoint detection and response to the more recent need for cloud workload protection and real-time response.

How to Secure Kubernetes (on the) Right
A detailed look at why runtime insights are needed to secure Kubernetes.