On June 16, 2025, I gave a Lightning Talk at KubeCon + CloudNativeCon Japan 2025. The title of my talk was: “From Kernel To Kubernetes: Mapping eBPF-Detected Processes To Pods!” In this session, I …| Yuki Nakamura's Blog
On Mar 15, 2025, I had the pleasure of presenting at the Cloud Native Community Japan – eBPF Japan Meetup #3, where I introduced Tetragon’s implementation of eBPF-based Process Lifecycl…| Yuki Nakamura's Blog
tetragon-ec2-image-builder| isovalent.com
Use the MITRE ATT&CK framework to transform the deep telemetry from Tetragon into clear, actionable insights about adversary behavior.| isovalent.com
Introduction| Welcome to Eleni's Blog Blog
See the top eBPF runtime security use cases, and how eBPF security offers stronger runtime enforcement and threat detection.| isovalent.com
Tetragon is the standard for eBPF-based security observability, let’s look at what that means for the top security use cases being solved.| isovalent.com
TL;DR In this post, I explain how Tetragon detects process creation and termination using eBPF.🐝 Introduction I was really impressed when I used Tetragon for the first time. Just after deploying Tetragon, it automatically collected process lifecycle events like: I’ve been reading Tetraon’s code to understand its implementaion in kernel-space and user-space programs. Now that… Continue reading Tetragon Process Lifecycle Observation: eBPF Part→| Yuki Nakamura's Blog
Isovalent Enterprise for Tetragon 1.13: Kubernetes Identity Aware Policies, Default Rulesets, HTTP and TLS Visibility, and More!| isovalent.com
Detecting XZ Utils liblzma CVE 2024-3094 backdoor exploit with Tetragon and eBPF. Includes ready to apply yaml policy.| isovalent.com
Why eBPF is the future of cloud-native FIM, a technical look at Tetragon's file monitoring and enforcement architecture.| isovalent.com
Tetragon 1.0 - What is new? Performance overhead benchmarks, default observability policies, kubectl exec monitoring, and much more!| isovalent.com