The Curious Case of a Kibana Compromise

The sun rose, coffee was guzzled, and fingers clicked away at keys, making it a typical day at Capsule8 HQ – until it wasn’t. As the Capsule8 team deployed one …

Here’s How Capsule8 Protect Helps You Achieve HIPAA Compliance for Your Linux Production Environment

By the end of December 2018, the HHS Office for Civil Rights received notifications that a staggering 13 million healthcare records had been exposed.  Even with strict HIPAA regulations in …

Customer Interview: Looker

With over 1700 industry-leading and innovative companies such as Sony, Amazon, IBM, Spotify, Etsy and Lyft trusting Looker’s data platform, Looker takes security seriously.  The Looker Security Operations team, managed …

The Methods to our Madness: How Capsule8’s Detection Methods Work

One of the best weapons in defending against attackers is speed. The ability to detect an attacker’s attempts as soon as it happens, and in turn shut it down before …

Search No Further: Capsule8 Supports Google Cloud Security Command Center with Security Partner Integration

Today is another big day for Capsule8. We officially announced that we are included as a Security Partner Integration within the newly launched Google Cloud Security Command Center (Cloud SCC). …

Between Two Kernels: Halvar Flake – E03

In Episode 3 Kelly chats with Halvar Flake, former Project Zero team member at Google and Co-Founder of optimyze. The two get philosophical about vendor tag lines, characterize his new …

Between Two Kernels: Allan Alford – E02

In Episode 2 of Between Two Kernels Kelly chats with CISO Allan Alford about being the most hated man in his organization, the three biggest mistakes of his life, and …

Between Two Kernels: Art Coviello

We’re excited to kick off a new video series with our VP of Product Strategy, Kelly Shortridge, titled “Between Two Kernels.” Kelly aims to conduct short, potentially awkward interviews with …

Capsule8’s Stance on Publication and Vulnerability Disclosure

Last week, Capsule8 Labs released an exploit for the problems in systemd that Qualys identified on January 9th, as part of series analyzing the vulnerabilities CVE-2018-16865 and CVE-2018-16866. We were …