No More Tiers: Reimagining the Structure of SecOps

Why not both? I’m not sure who thought that arbitrary hierarchical silos among a team of individual contributors was good for team morale and load-balancing, but here we are. During …

Container Security – Nobody Knows What It Means But It’s Provocative

The current understanding of “container security” as a term and market is muddled, especially given containers are used by different teams in different contexts. It could mean scanning image repositories …

EDR for Linux: Detection and Response in Linux Environments

The 3 pillars every solution needs to protect critical Linux production environments Despite the steady ascent of Linux to the top of the production stack, security has often been an …

Security Challenges for Containers in Runtime

Protecting containers in runtime is a critical element in securing containerized applications. There are a number of threats that occur in real-time when containers are running in production so a …

3 Tips for Scaling Container Security

Container adoption continues to grow as enterprises large and small look to increase the efficiency of their software delivery with hybrid production environments. According to recent research we sponsored with …

Seven Key Takeaways from the Cloud-Native Security Summit

Earlier this week we wrapped up very first Cloud-Native Security Summit, an exclusive event co-hosted by Capsule 8, Duo Security, and Signal Sciences, designed to tackle all things cloud-native security. …

How to Tell if Your Company is Suffering from Security Alert Fatigue

We’ve been talking about security alert fatigue a lot here at Capsule8 because it is a very real concern we hear from prospects, customers, and other organizations that are trying secure …

An Essential Guide to Cloud Native Security

What Is Cloud Native? Cloud native applications are designed and built on the cloud. On a higher level, “cloud native” is a fundamentally new approach to application design and deployment …

The Evolution of Zero Day Attacks and How to Prevent Them

What is a Zero Day Attack? “Better the devil you know than the devil you don’t.” someone important, probably A zero-day is the devil you don’t know. Whether you’re talking …