New Research: Zero Days Cannot Be Contained

The term “zero-day” can cause a normal day at any company to go from zero to sixty right quick. Every security person knows you’re probably vulnerable somewhere within your infrastructure, …

Detecting Meltdown and Spectre by Detecting Cache Side Channels

Last week, we delivered an open source detector for some variants of the Meltdown attack and promised that we’d provide a more generic detection for more variants of Meltdown and …

Detecting Meltdown using Capsule8

Meltdown and Spectre are such pervasive issues; they’re news on every major outlet. The security world is simultaneously in awe of the attack and panicking about remediation. What nobody is …

Now Available: KubeCon Encore on How To Prevent Attacks at Scale on Cloud-Native Environments

Capsule8 co-founder and CTO, Dino Dai Zovi, recently headed to Austin to present at KubeCon and CloudNativeCon and share with an audience of more than 300 attendees some new ways …

Podcast: Dino Dai Zovi on Risky Business

As companies look to move workloads into this new cloud-native world of containers and microservices, one issue that is driving anxiety is the lack of visibility into areas where there …

We’re Heading to KubeCon – Learn to Prevent Attacks at Scale

Next week (Dec. 6-8), Austin will become all things Kubernetes and Cloud Native as the community comes together for three days to take on some of the biggest issues and …

The Evolution of Zero Day Attacks and How to Prevent Them

What is a Zero Day Attack? “Better the devil you know than the devil you don’t.” someone important, probably A zero-day is the devil you don’t know. Whether you’re talking …

Capsule8 Scores $6 Million More in Funding

With near limitless computing power at our fingertips, we’re undergoing enormous changes in the enterprise that are making it possible to bring new ideas to market fast and respond to …

Resiliency Part 3 of 3: “Cattle, Not Pets,” Leveraging CI/CD Practices and the Concept of Reverse Uptime

Part 1: What is Resiliency and How Can We Apply to All Phases of Attack? Part 2: Using Misinformation and Intentional Failures to Your Advantage Part 3: Cattle, Not Pets, …

The Evolving Role of Security in a Software-defined World

The role of security is rapidly changing as data centers that were once typically defined by hardware and devices are taking the next step in virtualization to support both legacy …