Capsule8 Scores $6 Million More in Funding

With near limitless computing power at our fingertips, we’re undergoing enormous changes in the enterprise that are making it possible to bring new ideas to market fast and respond to …

Resiliency Part 3 of 3: “Cattle, Not Pets,” Leveraging CI/CD Practices and the Concept of Reverse Uptime

Part 1: What is Resiliency and How Can We Apply to All Phases of Attack? Part 2: Using Misinformation and Intentional Failures to Your Advantage Part 3: Cattle, Not Pets, …

The Evolving Role of Security in a Software-defined World

The role of security is rapidly changing as data centers that were once typically defined by hardware and devices are taking the next step in virtualization to support both legacy …

Resiliency Part 2: Using Misinformation and Intentional Failures to Your Advantage

Part 1: What is Resiliency and How Can We Apply to All Phases of Attack? Part 2: Using Misinformation and Intentional Failures to Your Advantage Part 3: Cattle, Not Pets, …

And We’re Off…Capsule8 Protect Enters Beta

Today marks a milestone in our short and exciting life at Capsule8. We are launching our flagship platform, Capsule8 Protect, into beta with some of the most exciting companies on …

Time to Blow Up the SOC?

Your Security Operations Center (SOC) is barraged with so many alerts that your team may be shell shocked into believing that they are under a constant and unmanageable assault. Indeed, …

Microservices and Modern Production Environments Are the Achilles’ Heel of SecOps

Microservices and the increasing popularity of service-based architecture have catapulted Linux from the coder’s tinker toy of yesterday to the most popular platform on the planet today. It’s no wonder …

What is Resiliency and How Can We Apply It to All Phases of Attack? Part 1 of 3

Part 1: What is Resiliency and How Can We Apply to All Phases of Attack? Part 2: Using Misinformation and Intentional Failures to Your Advantage Part 3: Cattle, Not Pets, …

The 7 Things We Value

There are so many reasons why launching a startup is energizing – the opportunity solve big, important problems in cybersecurity, to bring together people who share your entrepreneurial spirit and …

Threat Protection Appliances Are as Valuable to Security as Your Toaster

Nothing in the IT security community is as widely deployed and universally reviled as Anti-Virus. But, threat detection appliances, including intrusion prevention appliances, application firewalls and advanced threat protection appliances …