Rust supports a large number of target platforms, but BPF is not one of them yet. Therefore in order to compile for the BPF virtual machine, cargo-bpf needs to implement some ad-hoc build logic…Continue Reading: Oxidised eBPF II: Taming LLVM
Cybersecurity
Oxidised eBPF I: Building a toolchain
This is the first of two posts about ingraind and the Rust BPF library that powers it, RedBPF. In this post I’m going to give you an overview of what ingraind is, and how it led to the development of RedBPF. Then in the next post, I’m going to get a little more technical and show how we compile Rust code to BPF binary code…Continue Reading: Oxidised eBPF I: Building a toolchain
Interview: Tech Native – Democratizing Data & Harnessing it for Email Security
Rahul Powar talks to Tech Native about how we can democratize data to prevent spoofing attacks using our email security product, OnDMARC…Continue Reading: Interview: Tech Native – Democratizing Data & Harnessing it for Email Security
Red Sift Hires Chuck Swenberg as SVP of Strategy
The announcement comes on the heels of the company’s membership in the Microsoft Intelligent Security Association (MISA) and it’s recent Series A funding round, partly supported by In-Q-Tel, Inc., the non-profit strategic investor to U.S. intelligence and defense agencies. …Continue Reading: Red Sift Hires Chuck Swenberg as SVP of Strategy
Featured: Tracxn – Top Emerging Cybersecurity Startups To Watch Out For in 2020
The Cybersecurity sector has over 7K+ startups operating across hi-tech business models that detect, prevent, protect and respond to cyber threats and attacks on businesses, government organizations or individuals! The United States of America, United Kingdom and Israel are amongst the top countries with a high growth in the cybersecurity sector…Continue Reading: Featured: Tracxn – Top Emerging Cybersecurity Startups To Watch Out For in 2020
Universities: rich in knowledge, ripe for cyberattacks
As with any type of organisation, universities need to ensure they’re protecting critical data and systems. One easy to ignore point of entry is email – most IT teams will reassure you that they have the latest and greatest email gateway protection, but what many IT professionals with decades’ experience under their belts fail to realise is that even the tightest email gateway protection will be powerless against emails that purport to come from a legitimate source. …Continue Reading: Universities: rich in knowledge, ripe for cyberattacks