Posts by

Using Misinformation and Intentional Failures to Your Advantage
Resiliency Part 2: Using Misinformation and Intentional Failures to Your Advantage
July 26, 2017
Part 1: What is Resiliency and How Can We Apply to All Phases of Attack? Part 2: Using Misinformation and Intentional Failures to Your Advantage Part 3: Cattle, Not Pets, Leveraging CI/CD Practices and the Concept of Reverse Uptime In my last post about resiliency, we explored a number of ways to make a hacker’s […]
And We’re Off…Capsule8 Protect Enters Beta
July 26, 2017
Today marks a milestone in our short and exciting life at Capsule8. We are launching our flagship platform, Capsule8 Protect, into beta with some of the most exciting companies on the planet. You can read the official announcement here but I thought the time was right to share our backstory. How we got here and […]
Time to Blow Up the SOC?
Time to Blow Up the SOC?
July 25, 2017
Your Security Operations Center (SOC) is barraged with so many alerts that your team may be shell shocked into believing that they are under a constant and unmanageable assault. Indeed, they are under siege – from a constant barrage of data. Alert fatigue is not just some industry buzz phrase – it’s a very real […]
Microservices and Modern Production Environments vs. SecOps
Microservices and Modern Production Environments Are the Achilles’ Heel of SecOps
July 25, 2017
Microservices and the increasing popularity of service-based architecture have catapulted Linux from the coder’s tinker toy of yesterday to the most popular platform on the planet today. It’s no wonder that modern Linux is fast becoming the defacto operating system of production environments and powering the “software is eating the world” phenomenon. It’s simple and […]
What is Resiliency and How Can We Apply It to Cybersecurity Attacks
What is Resiliency and How Can We Apply It to All Phases of Attack? Part 1 of 3
July 25, 2017
Part 1: What is Resiliency and How Can We Apply to All Phases of Attack? Part 2: Using Misinformation and Intentional Failures to Your Advantage Part 3: Cattle, Not Pets, Leveraging CI/CD Practices and the Concept of Reverse Uptime The inevitability of your organization being breached is well established. Vulnerabilities are intrinsic to any software […]
The 7 Things We Value
July 25, 2017
There are so many reasons why launching a startup is energizing – the opportunity solve big, important problems in cybersecurity, to bring together people who share your entrepreneurial spirit and enthusiasm – to name just a few. But perhaps the most exciting part is creating the kind of company YOU (and hopefully a lot of […]
Threat Protection Appliances Are Not Valuable
Threat Protection Appliances Are as Valuable to Security as Your Toaster
July 10, 2017
Nothing in the IT security community is as widely deployed and universally reviled as Anti-Virus. But, threat detection appliances, including intrusion prevention appliances, application firewalls and advanced threat protection appliances should be almost as reviled. These appliances are nearly as useless as they are toxic. They do a horrible job finding problems and ultimately create […]