3 Tips for Scaling Container Security

Container adoption continues to grow as enterprises large and small look to increase the efficiency of their software delivery with hybrid production environments. According to recent research we sponsored with …

Introducing the SOC Hierarchy of Needs

An ineffective Security Operations Center (SOC) puts the security of your entire organization in jeopardy. Your SOC is under attack, facing a constant barrage of data that makes it nearly …

Seven Key Takeaways from the Cloud-Native Security Summit

Earlier this week we wrapped up very first Cloud-Native Security Summit, an exclusive event co-hosted by Capsule 8, Duo Security, and Signal Sciences, designed to tackle all things cloud-native security. …

How to Tell if Your Company is Suffering from Security Alert Fatigue

We’ve been talking about security alert fatigue a lot here at Capsule8 because it is a very real concern we hear from prospects, customers, and other organizations that are trying secure …

Black Hat Takeaways 2018

Another year at Black Hat has come and gone, with attendees  from around the world coming together to share and discuss their ideas, research, and discoveries. Did you attend Black …

Beyond the Basic EDR: Securing Production Environments against Zero-Day Threats

Endpoint protection is one of the most talked about markets in cybersecurity today. As users connect to corporate networks via a growing array of devices, security professionals require tools to …

CISOs: Understanding Three Consequences of Security Alert Fatigue

One of the biggest challenges faced by any SOC or security organization today is alert fatigue. There are only so many people on your team who can respond to and …

News From Capsule8 – Series B and Board of Advisors

When we launched Capsule8 1.0 back in April, we knew were on the right track for solving a huge market problem. We had completed a successful beta with some of …

Zero-Day Attack Detection: Focus on the Catch, not the Patch

When high profile zero-day vulnerabilities hit the headlines, security professionals around the world scramble to patch and remediate the damages. Zero-days such as ImageTragick, Shellshock, and most recently, Meltdown and …

An Essential Guide to Cloud Native Security: Part 3

Traditional Detection is a human exhaustion exercise Detection in a traditional SOC is based on investigation and analyzing alerts and event logs. When you have many security devices generating logs …