Posts by

Zero-Day Attack
The Evolution of Zero Day Attacks and How to Prevent Them
September 26, 2017
What is a Zero Day Attack? “Better the devil you know than the devil you don’t.” someone important, probably A zero-day is the devil you don’t know. Whether you’re talking about a previously unknown software vulnerability, or the code used to exploit it, zero-days can make a security practitioner’s life a living hell. There’s no […]
Capsule8 Scores $6 Million More in Funding
Capsule8 Scores $6 Million More in Funding
September 19, 2017
With near limitless computing power at our fingertips, we’re undergoing enormous changes in the enterprise that are making it possible to bring new ideas to market fast and respond to customer demand at a pace never before possible. This new cloud-native world, defined by containers, devops, continuous delivery methods and microservices, has the potential to […]
Leveraging CI/CD Practices and the Concept of Reverse Uptime
Resiliency Part 3 of 3: “Cattle, Not Pets,” Leveraging CI/CD Practices and the Concept of Reverse Uptime
September 9, 2017
Part 1: What is Resiliency and How Can We Apply to All Phases of Attack? Part 2: Using Misinformation and Intentional Failures to Your Advantage Part 3: Cattle, Not Pets, Leveraging CI/CD Practices and the Concept of Reverse Uptime As we conclude this series about resiliency, you’ll recall that we’ve focused on ways to make […]
Role of Security in a Software-defined World
The Evolving Role of Security in a Software-defined World
September 5, 2017
The role of security is rapidly changing as data centers that were once typically defined by hardware and devices are taking the next step in virtualization to support both legacy enterprise applications and new cloud computing services. The software-defined data center (SDDC) has gained significant traction, as its infrastructure is virtualized and delivered as a […]