All Blogs

Hacking Failure to Build Resilience
In Part One of our discussion on cyber resilience, we discussed the role of resilience as a core component of security. Drawing from a panel discussion led by Kelly Shortridge at the third annual Cloud Native Security Summit (CNSS), hosted by Capsule8 along with Open Raven and Snowflake, post emphasized resilience as a mindset that drives […]
Resilience as a Core Component of Successful Security
Closing out the 3rd Annual Cloud Native Security Summit (CNSS), hosted by Capsule8 along with Open Raven and Snowflake, was the “#realtalk on Resilience” session moderated by Kelly Shortridge. The panel featured Bea Hughes, Security Engineer at PagerDuty, Prima Virani, Search Security Engineer at Segment, and Rob Duhart Jr., Head of Federated Security at Google. […]
Software and Skydiving: Meet Matt Messier!
Our talented team at Capsule8 is full of cloud experts but there is one standout who gets a little closer to the cloud than the rest of us…literally. Meet Capsule8 Principal Software Engineer and Skydiving Extraordinaire Matt Messier!  Matt has been a part of Capsule8 for four years, almost since the beginning of it all. […]
The Scope and Impact of President Biden’s Executive Order on Cybersecurity
With cyber-attacks moving from small-scale assaults on private businesses to sweeping strikes on national infrastructure, the Federal Government is shifting resources and implementing new rules and regulations to address the growing challenge. On May 12, President Biden signed an executive order entitled Improving the Nation’s Cybersecurity, in which the administration outlined nearly a dozen ways […]
Achieving Compliance in a Cloud-Native World
One of the recurring challenges faced by companies adopting a cloud-native approach is achieving compliance. As organizations move ahead at speed on their digital transformation journey, cloud-native technologies remain key drivers in pursuing the optimization of business processes, culture, and customer experiences. In the face of this transformation, a traditional networking approach is not effective […]
Resiliency Part 3 of 3: “Cattle, Not Pets,” Leveraging CI/CD Practices and the Concept of Reverse Uptime
Part 1: What is Resiliency and How Can We Apply to All Phases of Attack? Part 2: Using Misinformation and Intentional Failures to Your Advantage Part 3: Cattle, Not Pets, Leveraging CI/CD Practices and the Concept of Reverse Uptime As we conclude this series about resiliency, you’ll recall that we’ve focused on ways to make […]
Resiliency Part 2: Using Misinformation and Intentional Failures to Your Advantage
Part 1: What is Resiliency and How Can We Apply to All Phases of Attack? Part 2: Using Misinformation and Intentional Failures to Your Advantage Part 3: Cattle, Not Pets, Leveraging CI/CD Practices and the Concept of Reverse Uptime In my last post about resiliency, we explored a number of ways to make a hacker’s […]
What is Resiliency and How Can We Apply It to All Phases of Attack? Part 1 of 3
Part 1: What is Resiliency and How Can We Apply to All Phases of Attack? Part 2: Using Misinformation and Intentional Failures to Your Advantage Part 3: Cattle, Not Pets, Leveraging CI/CD Practices and the Concept of Reverse Uptime The inevitability of your organization being breached is well established. Vulnerabilities are intrinsic to any software […]
Preparing Linux Hosts for Unexpected Threats 
Capsule8 Co-Founder and Chief Scientist, Brandon Edwards, recently joined Adrian Sanabria and Paul Asadoorian on a Security Weekly webcast to discuss how to effectively prepare Linux hosts for unexpected threats. Specifically, what comprises the current Linux threat landscape – the malware, vulnerabilities, and exploits that are currently impacting the industry – and how companies can […]
Seven Key Takeaways from the 2021 Cloud Native Security Summit
Capsule8 successfully wrapped up yet another Cloud Native Security Summit recently. This year’s exclusive virtual event, hosted by Capsule8 with partners Open Raven and Snowflake, focused on Lessons in Cyber Resilience. Pre-Covid, this would have been an in-person event with lots of networking and social interaction opportunities, and it’s so difficult to replicate that experience […]
DevOps, Support, and Soccer: Meet Chukwudi Stanley Onwumelu
As Capsule8 continued to gain momentum over the past year, the need for additional folks to support customer success became apparent. The search for people to help fill those roles led us to Chukwudi Stanley Onwumelu, our talented DevOps Support Engineer! And while Chukwudi had other interviews and an enticing offer in hand, he still […]
Climbing toward the Summit: The Cloud Native Security Summit is Almost Here
If you follow Capsule8 on social media, you’ve likely seen our barrage of speaker announcements, session updates, and overall agenda magic (literally, there is a magic show) for the upcoming Cloud Native Security Summit on April 14.  After two successful in-person events in New York in 2018 and San Francisco 2019, we were really looking […]
Capsule8 Announces 196% ARR Growth Over 2020
NEW YORK, April 08, 2021 (GLOBE NEWSWIRE) — Propelled by its FY2020 momentum, Capsule8, the pioneer behind “ops-friendly” Linux security, today announced it wrapped up its first quarter with record growth and bookings. This achievement also marks the third consecutive quarter of seven-digit sales bookings of its flagship product, Capsule8 Protect. Additional highlights of the quarter for […]
SELinux – a boon or bane?
SELinux seems to invoke conflicting emotions for many Linux practitioners. Before we explore why that might be the case, let’s answer some basic questions about SELinux. In this post, our goal is to provide an unbiased view of SELinux and its benefits and weaknesses for organizations considering implementing the tool. We will follow up with […]
5 Barriers to DevOps Deployment
According to a recent State of DevOps report, teams practicing DevOps benefit from a lower change failure rate, 24 times faster recovery from failures when they do occur, and significantly less time spent on rework and security issue remediation.  In short, DevOps helps reduce risk, improve productivity, and reduce costs. Such teams tend to be […]
Start-Ups and Food Trucks: Meet Terri Wagner!
As Head of Delivery and Support, Terri Wagner’s day is full of decision-making and developing processes to ensure our customers benefit from the steps and procedures Capsule8 puts into place. She leads the team responsible for making and keeping our clients happy, and we are especially happy to have her on board.  Terri has only […]
A Serverless Explainer for Defenders
What is all this “serverless” stuff and why should security people care? The tl;dr is that serverless compute services – also known as “function-as-a-service” – are efficient at handling events on-demand in applications that don’t have a constant firehose of requests. Your developers will vibe with not having to worry about anything but their code, […]
Linux Tracing 101: Do You Know What Your Servers Are Doing
In a recent webinar, Capsule8 Research Scientist Nick Gregory discussed some of the core building blocks of server monitoring and tracing in Linux. To get the most from your systems, it’s more important than ever to monitor and trace potential issues and to understand the key components of a successful response system. Let’s take a […]
How to Maintain Security for On-Demand Containers & Stateless Environments
On-demand containers and stateless environments are a class of infrastructure components that play a very important part in running the daily business operations. They can be used for business continuity tasks, for backups, batch processing, CI/CD jobs, transactional emails, auto-scaling, asynchronous workloads and many other reasons. From a security perspective, securing those containers or environments […]
From Calculators to Capsulators: Meet Scott Kenerly
According to Capsule8’s Scott Kenerly, being the CFO of high-tech startups is “not for the faint of heart.” On any given day, he’s tackling projects that range from corporate development to strategy, to accounting/finance, to human resources, to operations, and beyond. And with a fast-moving security landscape, a global pandemic, and an entirely remote workforce, […]
What will Define Cybersecurity Moving into 2021?
We are in a unique position as 2021 gets underway. With the coronavirus pandemic still very much a factor, cybersecurity priorities have shifted dramatically in the last twelve months, with an increased focus on distributed workforces and the technologies that support them.  Risk comes from all angles, with users, vendors, partners, and systems all contributing […]
1 2 3 7