PinnedAn Intro to Kubernetes Hardening.Securing Kubernetes requires an understanding of many moving parts. This intro discusses the most important concepts for its defence.Jan 6, 20245Jan 6, 20245
PinnedHypercomputation and the Limits of Computing.We have proven physical limits on precision, speed and energy, but are yet to bound computability.Apr 30, 2023Apr 30, 2023
Detection Engineering: Overcoming Visibility Gaps in LDAP Enumeration with AD CanariesSOC detections for AD enumerationFeb 19Feb 19
Offensive Kerberos Techniques for Detection EngineeringHunting for Kerberoasting, forged tickets, delegation-based attacks and more.Jan 121Jan 121
Kubernetes Security: eBPF & Tetragon for Runtime Monitoring & Policy EnforcementExploring eBPF for runtime visibility into Kubernetes workloads with Tetragon.Sep 28, 2024Sep 28, 2024
The Containerization Tech StackUnderstanding Docker, OCI, Runtimes, Namespaces, gVisor, Kata and Confidential Containers.Jul 22, 2024Jul 22, 2024
Kubernetes Network Security: Exploring Cilium and Istio ImplementationsComparing the designs of Cilium and Istio — both popular service mesh choices.Jun 23, 20241Jun 23, 20241
Kubernetes Security Tools: FalcoFlaco, the goto for real time Kubernetes threat detection.May 5, 2024May 5, 2024
Kubernetes Security Tools: OPA Gatekeeper & TrivyOPA Gatekeeper and Trivy are important Kubernetes security tools for admission control and to limit vulnerabilities and misconfigurations.Mar 12, 2024Mar 12, 2024