Breaking Down ESXi

The XL Security Elephant in the Room Usage of ESXi servers is increasingly popular for organizations with a need for effective virtualization and continuous access to their Virtual Machine (VM) management. Unfortunately, this also makes ESXi servers a prime target for...

The Risks of Using eBPF for Security

The Risks of Using eBPF for Security eBPF (extended Berkeley Packet Filters) has emerged as a powerful tool for extending the functionality of the Linux kernel, enabling the implementation of security solutions. However, using eBPF for security purposes is not without...

Protecting Kubernetes Clusters with ZeroLock®

Protecting Kubernetes Clusters with ZeroLock® In this white paper, we examine how ZeroLock protects Kubernetes clusters from attacks at runtime. Why Runtime Security for Kubernetes First, you might be asking yourself, “What is runtime protection and why do I need it?”...

ZeroLock® Deployment and Integration

ZeroLock Deployment and Integration Introduction Internationally renowned cryptographer, Bruce Schneier, wrote that “complexity is the worst enemy of security, and our systems are getting more complex all the time.” This statement is especially true today as AI...

Understanding Linux v. Windows Attack Vectors

Understanding Linux v. Windows Attack Vectors In the world of information technology there are many threats to end users, organizations, and customers. Malicious actors tailor their attacks to fit the vulnerabilities of the target, objective of the attack, and...