Posts by

Privacy, Data Security & Compliance with Cynthia Burke
March 10, 2021
In most IT shops, privacy, data security and compliance often resided under the same umbrella of ownership. While all 50 States in the US have data breach notification laws, we are seeing a shift in focus on data privacy globally. Privacy and data security compliance are often used interchangeably but this misuse in terminology (and […]
Targeting, Exploiting, & Defending Linux
February 23, 2021
As Linux workloads continue to rise, attacks on Linux continue to increase. During this podcast our Chief Scientist and Co-Founder, Brandon Edwards teams up with Security Weekly to answer: Why is targeting it different on Linux? What types of attacks are used? How can we defend against attacks on Linux? In addition to answering these […]
Building Operational Security in the Cloud: The Case for Partnership Between Infosec and Cloud Engineers
January 26, 2021
Following our successful webcast with 451 Research, Divided We Fail: How Security Teams Can Better Engage with DevOps, Fernando Montenegro answers questions in the video below, furthering the case for partnerships between Infosec and Cloud Engineers.
Exit Stage Left: Replacing Theater with Chaos
November 18, 2020
Recorded at Cloud Native Security Day 2020 Capsule8’s VP of Product Management and Product Strategy, Kelly Shortridge explores how security theater leads to increased organizational friction, especially in the realm of software delivery, rather than promoting safety. She’ll contrast these dramatics with a security chaos engineering approach – one which embraces the importance of convenience, […]
Ramping up with FedRAMP
October 9, 2020
Cynthia Burke, Capsule8 Program Manager, will give a high level overview of the Federal Risk and Authorization Management Program (FedRAMP) landscape and will discuss some of the challenges of and best practices for FedRAMP compliance using specific case study examples to help guide you and your team up the compliance hill with FedRAMP.
Between 2 Kernels: Joel Fulton – E06
April 15, 2020
Things get a bit macabre in our latest episode of B2K featuring reformed CISO Joel Fulton. The two talk about the problem with products, how being a CISO is like living in a survival horror role playing game, and how a golf course is a metaphor for pursuing security. Video Transcript Kelly Shortridge: Welcome […]
Between 2 Kernels: Sounil Yu – E05
March 26, 2020
Sounil Yu lays out his framework for thinking about all variety of subjects on the latest episode of Between 2 Kernels with Kelly Shortridge. The two cover his sentiments on useless security products, AI-enabled quantum trust, and giving 3 year olds automatic weapons. Video Transcript Kelly Shortridge: Welcome to Between Two Kernels. I am […]
Container Escape Demo
March 23, 2020
Watch a video demo of Capsule8 Protect in action detecting a container escape exploit.
Between 2 Kernels: Ian Coldwater – E04
March 19, 2020
Video Transcript Kelly Shortridge: Welcome to another edition of Between Two Kernels. Today’s guest is Ian Coldwater, who has that one secret trick that means that containers hate them. Welcome, Ian. Ian Coldwater: Thank you. Kelly Shortridge: You’re welcome. Ian Coldwater: Really appreciate being here. Kelly Shortridge: So there’s a really big debate that happens […]
A Compendium of Container Escapes – Black Hat 2019
December 13, 2019
Learn the how and why container escapes work, starting from a brief intro to what makes a process a container, and then spanning the gamut of escape techniques, covering exposed orchestrators, access to the Docker socket, exposed mount points, /proc, all the way down to overwriting/exploiting the kernel structures to leave the confines of the […]
Capsule8 Investigations Quick Start with AWS Athena
December 10, 2019
Clear Sky logo
TAG Cyber: Interview with John Viega
July 25, 2019
TAG Cyber sits down with Capsule8 CEO John Viega to discuss how Capsule8 secures Linux production environments.