Applying the Linux MITRE ATT&CK Framework with Capsule8

The MITRE ATT&CK™ framework is becoming increasingly adopted as a way to validate detection coverage. If you aren’t yet familiar with it, ATT&CK is an open-source knowledge base of tactics …

Our 2020 Security Predictions Clickbait Will Leave You SHOOK!

Prediction lists in the security industry are mostly self-indulgent fan fiction, so we decided to create an anti-meme in response. Rather than spin tall tales about drones using lasers to …

How Capsule8 Approaches Linux Monitoring

We at Capsule8 have put a lot of thought into our product by thinking about what would make us most mad as hackers if we encountered it while attacking an …

Here’s How Capsule8 Protect Helps You Achieve HIPAA Compliance for Your Linux Production Environment

By the end of December 2018, the HHS Office for Civil Rights received notifications that a staggering 13 million healthcare records had been exposed.  Even with strict HIPAA regulations in …

Introducing Capsule8 Investigations

This week we announced Investigations, new functionality that enables cloud users to maintain a dedicated database just for security data without the cost or burden of having to set up …

How Security Teams Can Learn to Stop Worrying and Love the OODA Loop

A well-loved military operational strategy is the OODA loop, a learning cycle that helps the operator gain an advantage against their opponent by responding with greater agility to unfolding events. …

Customer Interview: Looker

With over 1700 industry-leading and innovative companies such as Sony, Amazon, IBM, Spotify, Etsy and Lyft trusting Looker’s data platform, Looker takes security seriously.  The Looker Security Operations team, managed …

Linux Security Fun With Webhooks

At Capsule8, we want to let you work the way you prefer working rather than forcing new workflows on you. To realize this philosophy, we designed Capsule8 to be super …

The Methods to our Madness: How Capsule8’s Detection Methods Work

One of the best weapons in defending against attackers is speed. The ability to detect an attacker’s attempts as soon as it happens, and in turn shut it down before …