Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Securing Cloud Native Applications with eBPF (Early Release)

    Posted By: GFX_MAN
    Securing Cloud Native Applications with eBPF (Early Release)

    Securing Cloud Native Applications with eBPF (Early Release)
    English | 2024 | ISBN: 9781098157401 | 200 pages | PDF,EPUB,MOBI | 5.56 MB

    It's highly unusual today for application developers to build their own software from the ground up. They rely instead on open source projects and prebuilt libraries to bring products to market faster at reduced costs. But hackers are increasingly and aggressively targeting open source components as a way to break into the supply chain. And Kubernetes is a rich target.

    This practical book introduces the uses and benefits of eBPF-based security observability, specifically how eBPF-based runtime security tools can provide deep visibility into both the host and Kubernetes workloads. You'll learn how to reduce the attack surface of your production environment and mitigate vulnerabilities in your software supply chain and open source dependencies.

    Authors Jed Salazar from Chainguard and Natalia Reka Ivanko from Isovalent explain how to

    Use cutting-edge cryptography to create application identities that are verified at runtime
    Provide low overhead and near-real-time security observability into a production system to continuously verify and maintain the trust built in your supply chain
    Effectively respond to security incidents, cut off attack vectors, and determine exactly when and how the attacks happened
    Identify the compromised data and assess the risk to other system components
    Minimize your attack surface and continually harden your production environment
    Apply additional mitigations and rebuild trust in the environment