У нас вы можете посмотреть бесплатно eBPF with Liz Rice: Unlocking Kernel Power for Security, Networking & Observability или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In this episode of Nerding Out with Viktor, Viktor Petersson explores eBPF with Liz Rice, open source leader and kernel programming expert, to uncover how eBPF is transforming security and networking. They trace the evolution of eBPF from its roots in packet filtering to becoming a dynamic, programmable interface to the Linux kernel. Liz shares how it’s powering tools like Cilium and Tetragon, replacing iptables, enabling zero-trust networks, and reshaping runtime observability and security at scale. You’ll also hear about Isovalent’s acquisition by Cisco, why runtime security beats antivirus in modern Linux environments, and how eBPF is helping regulated industries meet NIST 2.0 compliance without sacrificing innovation. Topics covered: *What eBPF is and why it matters in modern Linux systems *How eBPF enables secure, high-performance kernel-level programming *Using Cilium to replace iptables and enforce Kubernetes network policies *Building lightweight service meshes without sidecars *WireGuard, IPsec, and cryptographic workload identity with SPIFFE/SPIRE *Tetragon and real-time detection of runtime threats *eBPF vs antivirus: a new approach to Linux security *Supply chain security, SBOMs, and runtime risk mitigation *How eBPF supports compliance in regulated environments like finance *The future of eBPF under Cisco’s acquisition of Isovalent Whether you're into cybersecurity, cloud-native networking, or kernel internals, this episode is essential listening for anyone working in modern infrastructure. Timestamps: 00:00 – Introduction to eBPF with Liz Rice 00:40 – What is eBPF and why it matters 02:10 – Real-world use cases: Netflix, Meta & Cilium 07:20 – How eBPF improves container networking & replaces iptables 11:20 – Zero-trust networking, encryption & workload identity 15:10 – eBPF vs Istio: Rethinking the service mesh 18:30 – Runtime security: MTLS, Tetragon & in-kernel policies 24:15 – eBPF security concerns, verification & attack vectors 31:00 – Supply chain risks, SBOMs & compliance challenges 43:10 – Cisco acquisition, open source future & final thoughts