Podcast: Dino Dai Zovi on Risky Business

As companies look to move workloads into this new cloud-native world of containers and microservices, one issue that is driving anxiety is the lack of visibility into areas where there …

We’re Heading to KubeCon – Learn to Prevent Attacks at Scale

Next week (Dec. 6-8), Austin will become all things Kubernetes and Cloud Native as the community comes together for three days to take on some of the biggest issues and …

Capsule8 Scores $6 Million More in Funding

With near limitless computing power at our fingertips, we’re undergoing enormous changes in the enterprise that are making it possible to bring new ideas to market fast and respond to …

Resiliency Part 3 of 3: “Cattle, Not Pets,” Leveraging CI/CD Practices and the Concept of Reverse Uptime

Part 1: What is Resiliency and How Can We Apply to All Phases of Attack? Part 2: Using Misinformation and Intentional Failures to Your Advantage Part 3: Cattle, Not Pets, …

The Evolving Role of Security in a Software-defined World

The role of security is rapidly changing as data centers that were once typically defined by hardware and devices are taking the next step in virtualization to support both legacy …

Resiliency Part 2: Using Misinformation and Intentional Failures to Your Advantage

Part 1: What is Resiliency and How Can We Apply to All Phases of Attack? Part 2: Using Misinformation and Intentional Failures to Your Advantage Part 3: Cattle, Not Pets, …

And We’re Off…Capsule8 Protect Enters Beta

Today marks a milestone in our short and exciting life at Capsule8. We are launching our flagship platform, Capsule8 Protect, into beta with some of the most exciting companies on …

Time to Blow Up the SOC?

Your Security Operations Center (SOC) is barraged with so many alerts that your team may be shell shocked into believing that they are under a constant and unmanageable assault. Indeed, …

Microservices and Modern Production Environments Are the Achilles’ Heel of SecOps

Microservices and the increasing popularity of service-based architecture have catapulted Linux from the coder’s tinker toy of yesterday to the most popular platform on the planet today. It’s no wonder …

What is Resiliency and How Can We Apply It to All Phases of Attack? Part 1 of 3

Part 1: What is Resiliency and How Can We Apply to All Phases of Attack? Part 2: Using Misinformation and Intentional Failures to Your Advantage Part 3: Cattle, Not Pets, …