An Essential Guide to Cloud Native Security: Part 2

In our previous post, we discussed how a cloud native environment differs from a traditional IT architecture. To summarize: cloud native is microservice-centric, portable and automatically managed. This raises a …

An Essential Guide to Cloud Native Security: Part 1

What Is Cloud Native? Cloud native applications are designed and built on the cloud. On a higher level, “cloud native” is a fundamentally new approach to application design and deployment …

New Research: Zero Days Cannot Be Contained

The term “zero-day” can cause a normal day at any company to go from zero to sixty right quick. Every security person knows you’re probably vulnerable somewhere within your infrastructure, …

Part Two: Detecting Meltdown and Spectre by Detecting Cache Side Channels

Last week, we delivered an open source detector for some variants of the Meltdown attack and promised that we’d provide a more generic detection for more variants of Meltdown and …

Part One: Detecting Meltdown using Capsule8

Meltdown and Spectre are such pervasive issues; they’re news on every major outlet. The security world is simultaneously in awe of the attack and panicking about remediation. What nobody is …

Podcast: Dino Dai Zovi on Risky Business

As companies look to move workloads into this new cloud-native world of containers and microservices, one issue that is driving anxiety is the lack of visibility into areas where there …

Resiliency Part 3 of 3: “Cattle, Not Pets,” Leveraging CI/CD Practices and the Concept of Reverse Uptime

Part 1: What is Resiliency and How Can We Apply to All Phases of Attack? Part 2: Using Misinformation and Intentional Failures to Your Advantage Part 3: Cattle, Not Pets, …

Resiliency Part 2: Using Misinformation and Intentional Failures to Your Advantage

Part 1: What is Resiliency and How Can We Apply to All Phases of Attack? Part 2: Using Misinformation and Intentional Failures to Your Advantage Part 3: Cattle, Not Pets, …

Time to Blow Up the SOC?

Your Security Operations Center (SOC) is barraged with so many alerts that your team may be shell shocked into believing that they are under a constant and unmanageable assault. Indeed, …

Microservices and Modern Production Environments Are the Achilles’ Heel of SecOps

Microservices and the increasing popularity of service-based architecture have catapulted Linux from the coder’s tinker toy of yesterday to the most popular platform on the planet today. It’s no wonder …