QPoint Logo
QTap - Visibility into EncryptionQPlane - Compliance Evidence
Third-Party Data RiskAI Data ExposureCompliance Evidence
Pricing
About Us
Blog
The Encryption Paradox

The Encryption Paradox

Every security incident post-mortem reveals the same pattern: the evidence was there in the network traffic all along. The warning signs existed, but they were hidden beneath layers of encryption and distributed across dozens of services.
Devin Bernosky
Devin Bernosky
September 9, 2025

Why Running Qtap in Production is Safe - A Deep Dive into eBPF and Privilege Boundaries

Jon Friesen
September 5, 2025

The eBPF Verifier - How Linux Safely Runs User Code in Kernel Space

Jon Friesen
September 2, 2025

The Impossible Proxy - An Egress Journey

Devin Bernosky
September 2, 2025

Security Observability for the Encrypted Cloud

Tyler Flint
April 29, 2025

A Story About Missing Context

Devin Bernosky
April 15, 2025

The Truth is on the Wire

Rob Genova
February 4, 2025

New Year, New User Experience!

Tyler Flint
January 9, 2025

The Hidden Risks of Third-Party API Dependencies

Rob Genova
December 16, 2024

Uncovering the Hidden Footprint of Your Third-Party API Integrations

Devin Bernosky
December 3, 2024

Turning Blind Spots Into Visibility and Insights for SRE Teams

Rob Genova
November 14, 2024

Qpoint Closes Pre-Seed Funding and Launches eBPF-based Monitoring and Control for External APIs and Services

Tyler Flint
October 22, 2024

What is eBPF?

Rob Genova
October 1, 2024
Use CasesPricingBlogFAQ
DocsAbout UsRequest a Demo
Terms of ServicePrivacy PolicyCookie PolicyCookie Preferences
Request a Demo
© 2025 Qpoint