
The Encryption Paradox
Every security incident post-mortem reveals the same pattern: the evidence was there in the network traffic all along. The warning signs existed, but they were hidden beneath layers of encryption and distributed across dozens of services. 

Devin Bernosky
September 9, 2025
Why Running Qtap in Production is Safe - A Deep Dive into eBPF and Privilege Boundaries
Jon Friesen
September 5, 2025
The eBPF Verifier - How Linux Safely Runs User Code in Kernel Space
Jon Friesen
September 2, 2025
The Impossible Proxy - An Egress Journey
Devin Bernosky
September 2, 2025
Security Observability for the Encrypted Cloud
Tyler Flint
April 29, 2025
A Story About Missing Context
Devin Bernosky
April 15, 2025
The Truth is on the Wire
Rob Genova
February 4, 2025
New Year, New User Experience!
Tyler Flint
January 9, 2025
The Hidden Risks of Third-Party API Dependencies
Rob Genova
December 16, 2024
Uncovering the Hidden Footprint of Your Third-Party API Integrations
Devin Bernosky
December 3, 2024
Turning Blind Spots Into Visibility and Insights for SRE Teams
Rob Genova
November 14, 2024
Qpoint Closes Pre-Seed Funding and Launches eBPF-based Monitoring and Control for External APIs and Services
Tyler Flint
October 22, 2024
What is eBPF?
Rob Genova
October 1, 2024