Seven Key Takeaways from the Cloud-Native Security Summit

Earlier this week we wrapped up very first Cloud-Native Security Summit, an exclusive event co-hosted by Capsule 8, Duo Security, and Signal Sciences, designed to tackle all things cloud-native security. …

Black Hat Takeaways 2018

Another year at Black Hat has come and gone, with attendees  from around the world coming together to share and discuss their ideas, research, and discoveries. Did you attend Black …

An Essential Guide to Cloud Native Security: Part 3

Traditional Detection is a human exhaustion exercise Detection in a traditional SOC is based on investigation and analyzing alerts and event logs. When you have many security devices generating logs …

An Essential Guide to Cloud Native Security: Part 2

In our previous post, we discussed how a cloud native environment differs from a traditional IT architecture. To summarize: cloud native is microservice-centric, portable and automatically managed. This raises a …

An Essential Guide to Cloud Native Security: Part 1

What Is Cloud Native? Cloud native applications are designed and built on the cloud. On a higher level, “cloud native” is a fundamentally new approach to application design and deployment …

New Research: Zero Days Cannot Be Contained

The term “zero-day” can cause a normal day at any company to go from zero to sixty right quick. Every security person knows you’re probably vulnerable somewhere within your infrastructure, …

Part Two: Detecting Meltdown and Spectre by Detecting Cache Side Channels

Last week, we delivered an open source detector for some variants of the Meltdown attack and promised that we’d provide a more generic detection for more variants of Meltdown and …

Part One: Detecting Meltdown using Capsule8

Meltdown and Spectre are such pervasive issues; they’re news on every major outlet. The security world is simultaneously in awe of the attack and panicking about remediation. What nobody is …

Podcast: Dino Dai Zovi on Risky Business

As companies look to move workloads into this new cloud-native world of containers and microservices, one issue that is driving anxiety is the lack of visibility into areas where there …

Resiliency Part 3 of 3: “Cattle, Not Pets,” Leveraging CI/CD Practices and the Concept of Reverse Uptime

Part 1: What is Resiliency and How Can We Apply to All Phases of Attack? Part 2: Using Misinformation and Intentional Failures to Your Advantage Part 3: Cattle, Not Pets, …