Posted on
in Presentations
eBPF is uncharted territory in terms of malicious activity detection. As threats continue to emerge, it’s time to get proactive. Attendees will learn about the different types of rootkits, their attack flow, how they operate and how to detect them. Lastly, they will learn how to use Tracee, an open-source tool harnessing eBPF to detect those threats and gain an advantage on the attackers.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community