# India FOSS Transcript Hello Everyone :wave: Thank You for joining me on my session on "Protecting Modern Workloads with BPF Superpowers". I will start with introducing myself, I am Barun Acharya also known as "daemon1024" on the internet. I work as a Software Engineer at Accuknow, We are working on Open Source Cloud Security Solutions. I have been assosciated with programs like Google Summer of Code and Linux Foundation Mentorship both as a mentee and a mentor. I hang around at Open Source Developers Community Noida, We are a small university community spreading love for Open Source. And I am a student. I mention Modern Workloads in my talk, but what I essentially wanted to mean is that Containers, Perhaps containers paired with some Orchestrator like Kubernetes. How many of you are using Containers at scale? With the various advantages that containers provide, The organizations worldwide are rapidly adopting Containers in one form or another. With the rise in adoption so has risen the cyber attacks on the same. With the rise in recent vulnerabilities like log4j and pwnkit there's an ever more demanding need to enforce security in containers. We generally have some form a static analysers in place, but vulnerabilities like Zero Days, Evasive Malware and Privilege Escalation attempts these may not be detected by static analysers. This is much like the disclaimer in Mutual Fund adds, past performance doesn't guarentee future safety/returns. So How de we deal with vulnerabilities that manifest at runtime? We deal with them at runtime. So the term, Container Runtime Security. Important aspects to Container Runtime Security is Detecting, Alerting and trying to prevent it. But what malicious activity? what are we trying to monitor and prevent here? To put some context to this let's go through an analogy. / Comic Slides Now let's jump back to