Posts by

Why IDS is Ineffective for Linux Production Environments
January 25, 2021
Organizations are evolving and modernizing their production environments with technologies like cloud, microservices and containers, and are more often mixed with both cloud and on-premises infrastructure and applications. This creates a changing attack surface that conventional security solutions such as IDS simply cannot address.
Retooling Cybersecurity Programs for the Cloud-first Era
September 26, 2019
Because lines of business are going directly to the cloud, cybersecurity and IT teams are losing control over both the administration and security of cloud-delivered applications. This decoupling, in which the consumer of the cloud service is administering its use, means that security teams are losing centralized visibility and control over the data assets associated […]
Capsule8 Protect
May 14, 2019
Capsule8 Protect is the Linux protection solution that keeps production environments free of compromise while preserving the high performance and reliability on which modern organizations depend. Read our whitepaper to learn about our approach.
Driving Toward the Automated SOC
April 30, 2019
SOCs need to be empowered: boosting the accuracy of threat detection and shortening the time to response – and doing it in a scalable way that doesn’t rely on hiring increasingly hard-to-find security personnel. Automation will be increasingly critical to a SOC’s ability to protect the enterprise.
How to Detect and Mitigate Zero-Day Attacks
February 1, 2019
The recent spate of zero-day attacks, such as Meltdown and Spectre in early 2018, has put the issue of zero-day threats at the forefront for SecOps teams and security engineers. Despite the increased urgency in understanding the threat itself, there’s still some confusion about what is meant by a “zero-day attack.”
The State of Cloud-Native Security
September 20, 2018
Capsule8, Duo, and Signal Sciences conducted a survey with 486 IT leaders to better understand the cybersecurity challenges and opportunities of the ongoing shift toward cloud native applications in Production Environments. Download the report now.
Detecting Spectre and Meltdown
Detecting Meltdown and Spectre
February 22, 2018
The Meltdown and Spectre vulnerabilities are wreaking havoc on the tech industry and loudly sounding an alarm that even complex, modern processors are still susceptible to big time vulnerabilities. One of the most important outcomes of this frenzy is the broadening of the conversation beyond mitigation and forcing companies critically about detection as part of their […]
Making Security Operations Scale whitepaper
Making Security Operations Scale
December 6, 2017
As cyber threats continue to escalate, organizations and governments alike are facing the most critical workforce shortage of our time. The current number of experienced cybersecurity professionals is not nearly enough to satisfy the insatiable hiring demands required to keep our societies safe. We are woefully short-handed in defending against increasingly sophisticated threats. To meet […]