Driving Toward the SOCless Enterprise

Alex Mastretti, engineering manager of the security intelligence and response team at Netflix, recently declared the formation of a “SOCless detection team,” signalling a shift in their security program in …

New Research: Zero Days Cannot Be Contained

The term “zero-day” can cause a normal day at any company to go from zero to sixty right quick. Every security person knows you’re probably vulnerable somewhere within your infrastructure, …

Detecting Meltdown and Spectre by Detecting Cache Side Channels

Last week, we delivered an open source detector for some variants of the Meltdown attack and promised that we’d provide a more generic detection for more variants of Meltdown and …

Detecting Meltdown using Capsule8

Meltdown and Spectre are such pervasive issues; they’re news on every major outlet. The security world is simultaneously in awe of the attack and panicking about remediation.What nobody is talking …

Now Available: KubeCon Encore on How To Prevent Attacks at Scale on Cloud-Native Environments

Capsule8 co-founder and CTO, Dino Dai Zovi, recently headed to Austin to present at KubeCon and CloudNativeCon and share with an audience of more than 300 attendees some new ways …

Podcast: Dino Dai Zovi on Risky Business

As companies look to move workloads into this new cloud-native world of containers and microservices, one issue that is driving anxiety is the lack of visibility into areas where there …

We’re Heading to KubeCon – Learn to Prevent Attacks at Scale

Next week (Dec. 6-8), Austin will become all things Kubernetes and Cloud Native as the community comes together for three days to take on some of the biggest issues and …

The Evolution of Zero Day Attacks and How to Prevent Them

What is a Zero Day Attack? “Better the devil you know than the devil you don’t.” someone important, probably A zero-day is the devil you don’t know. Whether you’re talking …

The Evolving Role of Security in a Software-defined World

The role of security is rapidly changing as data centers that were once typically defined by hardware and devices are taking the next step in virtualization to support both legacy …