Seven Key Takeaways from the Cloud-Native Security Summit

Earlier this week we wrapped up very first Cloud-Native Security Summit, an exclusive event co-hosted by Capsule 8, Duo Security, and Signal Sciences, designed to tackle all things cloud-native security. …

Beyond the Basic EDR: Securing Production Environments against Zero-Day Threats

Endpoint protection is one of the most talked about markets in cybersecurity today. As users connect to corporate networks via a growing array of devices, security professionals require tools to …

CISOs: Understanding Three Consequences of Security Alert Fatigue

One of the biggest challenges faced by any SOC or security organization today is alert fatigue. There are only so many people on your team who can respond to and …

News From Capsule8 – Series B and Board of Advisors

When we launched Capsule8 1.0 back in April, we knew were on the right track for solving a huge market problem. We had completed a successful beta with some of …

Zero-Day Attack Detection: Focus on the Catch, not the Patch

When high profile zero-day vulnerabilities hit the headlines, security professionals around the world scramble to patch and remediate the damages. Zero-days such as ImageTragick, Shellshock, and most recently, Meltdown and …

A Dozen Security Questions for DevOps after Deployment

DevOps brings operations and development teams together through the whole production lifecycle, leading to faster and more agile software development. But harder, better, faster, and stronger doesn’t always mean safer. …

Driving Toward the SOCless Enterprise

Alex Mastretti, engineering manager of the security intelligence and response team at Netflix, recently declared the formation of a “SOCless detection team,” signalling a shift in their security program in …

Capsule8 1.0 is Here!

Following a successful beta with some of the biggest companies from Wall Street and Silicon Valley, today we are making Capsule8 1.0 generally available to the enterprise and delivering on …

New Research: Zero Days Cannot Be Contained

The term “zero-day” can cause a normal day at any company to go from zero to sixty right quick. Every security person knows you’re probably vulnerable somewhere within your infrastructure, …

Part Two: Detecting Meltdown and Spectre by Detecting Cache Side Channels

Last week, we delivered an open source detector for some variants of the Meltdown attack and promised that we’d provide a more generic detection for more variants of Meltdown and …