All Blogs

KubeCon How To Prevent Attacks at Scale on Cloud-Native Environments
Now Available: KubeCon Encore on How To Prevent Attacks at Scale on Cloud-Native Environments
Capsule8 co-founder and CTO, Dino Dai Zovi, recently headed to Austin to present at KubeCon and CloudNativeCon and share with an audience of more than 300 attendees some new ways to detect and defend against attacks at-scale to your cloud-native environments. As an encore to the presentation, Dino recently hosted a webinar of his presentation, […]
Podcast: Dino Dai Zovi on Risky Business
Podcast: Dino Dai Zovi on Risky Business
As companies look to move workloads into this new cloud-native world of containers and microservices, one issue that is driving anxiety is the lack of visibility into areas where there is uncertainty.  Without the telemetry and visibility people are used to with their on-premise deployments, it’s difficult making the case that this next-gen environment is […]
KubeCon – Learn to Prevent Attacks at Scale
We’re Heading to KubeCon – Learn to Prevent Attacks at Scale
Next week (Dec. 6-8), Austin will become all things Kubernetes and Cloud Native as the community comes together for three days to take on some of the biggest issues and advancements in cloud native computing at KubeCon and CloudNativeCon. One of the topics on many attendees’ minds, especially with such rapid adoption of cloud native […]
Zero-Day Attack
The Evolution of Zero Day Attacks and How to Prevent Them
What is a Zero Day Attack? “Better the devil you know than the devil you don’t.” someone important, probably A zero-day is the devil you don’t know. Whether you’re talking about a previously unknown software vulnerability, or the code used to exploit it, zero-days can make a security practitioner’s life a living hell. There’s no […]
Capsule8 Scores $6 Million More in Funding
Capsule8 Scores $6 Million More in Funding
With near limitless computing power at our fingertips, we’re undergoing enormous changes in the enterprise that are making it possible to bring new ideas to market fast and respond to customer demand at a pace never before possible. This new cloud-native world, defined by containers, devops, continuous delivery methods and microservices, has the potential to […]
Leveraging CI/CD Practices and the Concept of Reverse Uptime
Resiliency Part 3 of 3: “Cattle, Not Pets,” Leveraging CI/CD Practices and the Concept of Reverse Uptime
Part 1: What is Resiliency and How Can We Apply to All Phases of Attack? Part 2: Using Misinformation and Intentional Failures to Your Advantage Part 3: Cattle, Not Pets, Leveraging CI/CD Practices and the Concept of Reverse Uptime As we conclude this series about resiliency, you’ll recall that we’ve focused on ways to make […]
Role of Security in a Software-defined World
The Evolving Role of Security in a Software-defined World
The role of security is rapidly changing as data centers that were once typically defined by hardware and devices are taking the next step in virtualization to support both legacy enterprise applications and new cloud computing services. The software-defined data center (SDDC) has gained significant traction, as its infrastructure is virtualized and delivered as a […]
Using Misinformation and Intentional Failures to Your Advantage
Resiliency Part 2: Using Misinformation and Intentional Failures to Your Advantage
Part 1: What is Resiliency and How Can We Apply to All Phases of Attack? Part 2: Using Misinformation and Intentional Failures to Your Advantage Part 3: Cattle, Not Pets, Leveraging CI/CD Practices and the Concept of Reverse Uptime In my last post about resiliency, we explored a number of ways to make a hacker’s […]
And We’re Off…Capsule8 Protect Enters Beta
Today marks a milestone in our short and exciting life at Capsule8. We are launching our flagship platform, Capsule8 Protect, into beta with some of the most exciting companies on the planet. You can read the official announcement here but I thought the time was right to share our backstory. How we got here and […]
Time to Blow Up the SOC?
Time to Blow Up the SOC?
Your Security Operations Center (SOC) is barraged with so many alerts that your team may be shell shocked into believing that they are under a constant and unmanageable assault. Indeed, they are under siege – from a constant barrage of data. Alert fatigue is not just some industry buzz phrase – it’s a very real […]
Microservices and Modern Production Environments vs. SecOps
Microservices and Modern Production Environments Are the Achilles’ Heel of SecOps
Microservices and the increasing popularity of service-based architecture have catapulted Linux from the coder’s tinker toy of yesterday to the most popular platform on the planet today. It’s no wonder that modern Linux is fast becoming the defacto operating system of production environments and powering the “software is eating the world” phenomenon. It’s simple and […]
What is Resiliency and How Can We Apply It to Cybersecurity Attacks
What is Resiliency and How Can We Apply It to All Phases of Attack? Part 1 of 3
Part 1: What is Resiliency and How Can We Apply to All Phases of Attack? Part 2: Using Misinformation and Intentional Failures to Your Advantage Part 3: Cattle, Not Pets, Leveraging CI/CD Practices and the Concept of Reverse Uptime The inevitability of your organization being breached is well established. Vulnerabilities are intrinsic to any software […]
The 7 Things We Value
There are so many reasons why launching a startup is energizing – the opportunity solve big, important problems in cybersecurity, to bring together people who share your entrepreneurial spirit and enthusiasm – to name just a few. But perhaps the most exciting part is creating the kind of company YOU (and hopefully a lot of […]
Threat Protection Appliances Are Not Valuable
Threat Protection Appliances Are as Valuable to Security as Your Toaster
Nothing in the IT security community is as widely deployed and universally reviled as Anti-Virus. But, threat detection appliances, including intrusion prevention appliances, application firewalls and advanced threat protection appliances should be almost as reviled. These appliances are nearly as useless as they are toxic. They do a horrible job finding problems and ultimately create […]
Capsule8 Update
While we are primarily heads down on development, there has been lots of activity at Capsule8 HQ. Public Launch In February, we announced a $2.5M seed round, led by Bessemer Venture Partners. We had brief funding mentions in Fortune, the Wall Street Journal, and the New York Business Journal. We got more substantial coverage from […]
AI Won’t Replace Developers
Last week, a Slashdot article suggested that eventually AI might replace a developer jobs (discussing Microsoft’s DeepCoder). I doubt it. AI techniques will eventually be able to automate some kinds of programming tasks that allow developers to abstract away and do more with their time. But I can’t imagine an AI replacing human developers. Let’s […]
Introducing Capsule8
Hi! I’m John Viega, CEO and co-founder of Capsule8. Thanks for taking an interest in what we are doing. We’re out to solve one of the biggest problems in the cyber-security today: protecting the Linux infrastructure. And we think we are on to something big. My co-founders and I are career-long hackers and serial entrepreneurs […]
1 4 5 6