WHITE PAPERS
ZeroLock’s Alignment with NIST CSF 2.0 for Comprehensive Hypervisor Security
In a world brimming with digital threats, compliance has become the blueprint for a secure and resilient organization. The NIST Cybersecurity Framework (CSF) 2.0 charts this essential path, and ZeroLock® is the vehicle that makes the...
The Risks of Using eBPF for Security
The Risks of Using eBPF for Security eBPF (extended Berkeley Packet Filters) has emerged as a powerful tool for extending the functionality of the Linux kernel, enabling the implementation of security solutions. However, using eBPF for...
Protecting Kubernetes Clusters with ZeroLock®
Protecting Kubernetes Clusters with ZeroLock® In this white paper, we examine how ZeroLock protects Kubernetes clusters from attacks at runtime. Why Runtime Security for Kubernetes First, you might be asking yourself, “What is runtime...
ZeroLock® Deployment and Integration
ZeroLock Deployment and Integration Introduction Internationally renowned cryptographer, Bruce Schneier, wrote that “complexity is the worst enemy of security, and our systems are getting more complex all the time.” This statement is...
Understanding Linux v. Windows Attack Vectors
Understanding Linux v. Windows Attack Vectors In the world of information technology there are many threats to end users, organizations, and customers. Malicious actors tailor their attacks to fit the vulnerabilities of the target,...
ZeroLock® & SELinux Comparison and Compatibility
ZeroLock & SELinux Comparison and CompatibilityZeroLock® is 100% compatible with SELinux. You do not need to disable SELinux protections to use ZeroLock. Overall, SELinux provides powerful, effective MAC for Linux systems. However,...
Securing Linux Infrastructure
Securing Linux Infrastructure Linux is the most critical component underlying systems in public clouds, private datacenters, and embedded/ IoT devices—yet there has been a lack of availability of effective tools to secure them. Most...
Fileless Attacks vs. Traditional Attacks
Fileless Attacks vs. Traditional Attacks The following document describes fileless attacks and how they differ from other types of cyber attacks. Additionally, this document examines ways to help prevent fileless attacks as well as the...
Protecting Containers with ZeroLock®
Protecting Containers with ZeroLock® The following document describes how the ZeroLock® agent interacts with containers running on Linux® systems. This document addresses a deployment model where ZeroLock agents are deployed on a...
Securing WordPress with ZeroLock® for Linux®
Securing WordPress with ZeroLock® for Linux® WordPress is one of the most popular content management systems in the world, enabling non-technical users to create beautiful, effective websites. Powering millions of websites, it’s a...