Seven Key Takeaways from the Cloud-Native Security Summit

Earlier this week we wrapped up very first Cloud-Native Security Summit, an exclusive event co-hosted by Capsule 8, Duo Security, and Signal Sciences, designed to tackle all things cloud-native security. …

How to Tell if Your Company is Suffering from Security Alert Fatigue

We’ve been talking about security alert fatigue a lot here at Capsule8 because it is a very real concern we hear from prospects, customers, and other organizations that are trying secure …

An Essential Guide to Cloud Native Security: Part 3

Traditional Detection is a human exhaustion exercise Detection in a traditional SOC is based on investigation and analyzing alerts and event logs. When you have many security devices generating logs …

An Essential Guide to Cloud Native Security: Part 2

In our previous post, we discussed how a cloud native environment differs from a traditional IT architecture. To summarize: cloud native is microservice-centric, portable and automatically managed. This raises a …

An Essential Guide to Cloud Native Security: Part 1

What Is Cloud Native? Cloud native applications are designed and built on the cloud. On a higher level, “cloud native” is a fundamentally new approach to application design and deployment …

Resiliency Part 3 of 3: “Cattle, Not Pets,” Leveraging CI/CD Practices and the Concept of Reverse Uptime

Part 1: What is Resiliency and How Can We Apply to All Phases of Attack? Part 2: Using Misinformation and Intentional Failures to Your Advantage Part 3: Cattle, Not Pets, …

The Evolving Role of Security in a Software-defined World

The role of security is rapidly changing as data centers that were once typically defined by hardware and devices are taking the next step in virtualization to support both legacy …

Resiliency Part 2: Using Misinformation and Intentional Failures to Your Advantage

Part 1: What is Resiliency and How Can We Apply to All Phases of Attack? Part 2: Using Misinformation and Intentional Failures to Your Advantage Part 3: Cattle, Not Pets, …

Time to Blow Up the SOC?

Your Security Operations Center (SOC) is barraged with so many alerts that your team may be shell shocked into believing that they are under a constant and unmanageable assault. Indeed, …

Microservices and Modern Production Environments Are the Achilles’ Heel of SecOps

Microservices and the increasing popularity of service-based architecture have catapulted Linux from the coder’s tinker toy of yesterday to the most popular platform on the planet today. It’s no wonder …