Resources

Product datasheets, technical whitepapers and guides, webinars, events, and more educational resources to help you learn about securing production Linux environments.

Filter

The Cloud Native Compliance Playbook: Strategies for the Enterprise

The reality for most organizations is that they are somewhere between hybrid cloud and cloud native on their cloud transformation journeys. A major roadblock for this delay is compliance – …

How Capsule8 Secures Production Linux Environments

Capsule8 protects high-performance Linux production environments – whether containerized, virtualized or bare-metal. The Capsule8 Protect platform detects and stops attacks in real-time, here’s how.

07 Aug /19

Black Hat Security Leaders VIP Party 2019

Come join the Capsule8 team @ Eyecandy and enjoy food, music and a full open bar.  We expect to hit capacity so don’t hesitate – get on the list now!

Between Two Kernels: Halvar Flake

Kelly chats with Halvar Flake, former Project Zero team member at Google and Co-Founder of optimyze. The two get philosophical about vendor tag lines, characterize his new start-up with buzzwords, …

Between Two Kernels: Allan Alford

Kelly chats with CISO Allan Alford about being the most hated man in his organization, the three biggest mistakes of his life, and which infosec category he would date, marry, …

Between Two Kernels: Art Coviello

Kelly catches up with Art Coviello at the 2019 RSA Conference talking about how he’d use the Infinity Gauntlet for the cybersecurity industry, infosec start ups and acquisitions, and how …

Capsule8 Overview: What We Do

Learn what problems Capsule8 solves and how it can ease the burden on SecOps teams and provide visibility and security for Linux production infrastructure.

RSA Innovation Sandbox 2019

Watch CEO and Co-Founder John Viega’s RSA Innovation Sandbox presentation as a top 10 finalist at the 2019 RSA Conference.

03 Aug /19

Black Hat

Catch Up with the Capsule8 Team at Black Hat Schedule a Meeting Our Speaking Sessions Controlled Chaos: The Inevitable Marriage of DevOps & Security We’ve all heard “software is eating …

18 Nov /19

KubeCon 2019

Members of the Capsule8 team will be at KubeCon 2019 in San Diego! If you’re interested in learning more about what we do, come stop in and talk to the …

23 Oct /19

FutureCon Orange County

Capsule8 would love to meet up with you at FutureCon Orange County. If you’re there, be sure to stop by and check us out!

09 Oct /19

Presidio’s Red Sky Security Conference

Capsule8 is headed to Denver for the Red Sky Security Conference. Members of the team will be available to network and talk more about Capsule8. Come stop by!

25 Jul /19

Optiv’s 2019 NorCal Golf Tournament

Capsule8 is a sponsor at the 2019 NorCal Golf Tournament hosted by Optiv. Spend a day on the links with us and other security professionals.

24 Jun /19

QCon New York

Proud to announce that our VP of Product Strategy, Kelly Shortridge, will be speaking at this year’s event! This is one that you won’t want to miss.

10 Jul /19

FutureCon Detroit

Come visit the Capsule8 team at FutureCon Detroit! If you plan on attending, come stop by and say hello.

Capsule8 Protect for File Integrity Monitoring

File integrity monitoring (FIM) is an important tool for you to monitor changes to critical systems, configuration and content files within your enterprise. Learn how Capsule8 Protect takes care of …

Compliance and A False Sense of Security

Understand in depth the unique challenges of compliance in this new cloud-native world, as well as share best practices for not only meeting compliance standards, but truly protecting your production …

25 Jun /19

Happy Hour at AWS re:Inforce

Join the Capsule8 and Signal Sciences teams for a Happy Hour at Legal Harborside to kick off the inaugural AWS re:Inforce event!

Capsule8 Protect

Capsule8 Protect is the Linux protection solution that keeps production environments free of compromise while preserving the high performance and reliability on which modern organizations depend. Read our whitepaper to …

Doing DevSecOps Right: Implementation & the Metrics that Matter

Join Amy DeMartine and Kelly Shortridge, vice president of product strategy at Capsule8, to learn not only how to implement DevSecOps, but also the KPIs and metrics you should measure …

25 Jun /19

AWS re:Inforce

Catch up with the Capsule8 team at AWS re:Inforce this June at a meeting or happy hour event at this premiere event.

Driving Toward the Automated SOC

SOCs need to be empowered: boosting the accuracy of threat detection and shortening the time to response – and doing it in a scalable way that doesn’t rely on hiring …

An Overview of Capsule8 for Operations

Read this primer to understand how Capsule8 has been architected to alleviate and mitigate concerns raised by operations stakeholders charged with optimizing the performance of production infrastructure.

Capsule8 for PCI Compliance

As businesses look to comply and, more importantly, protect cardholder data across Linux-based environments whether in the data center or cloud, Capsule8 delivers. Download this Solutions Brief to learn how …

Demo: Detection Capabilities of Capsule8 Protect

Learn how Capsule8 Protect delivers the right kind of data, at the right time – for each stage in an attack’s lifecycle. Because we’re detecting attacks from multiple vantage points …

Why IDS is Ineffective for Linux Production Environments

Organizations are evolving and modernizing their production environments with technologies like cloud, microservices and containers, and are more often mixed with both cloud and on-premises infrastructure and applications. This creates …

01 May /19

ODSC East

ODSC East 2019 is one of the largest applied data science conferences in the world. Harini Kannan, one of Capsule8’s data scientists, will be presenting “Machine learning To Detect Cyber …

Digging Down into Resilient Infrastructure

During our 20/20 webcast Resilience is not futile, we discussed the importance of building resilience into your security program. As we continue our discussion on cyber resilience, we’ll take a …

Capsule8’s Attack Detection Methods

Gain technical insight into Capsule8’s design philosophy behind detection methods as well as insight into the differences between kernel-level, userland, file system, and network detection methods.

Resilience is Not Futile

Not every company is able to survive a breach or disaster. Poor planning, such as having your server backups in the same general area as your data center after an …

How to Detect and Mitigate Zero-Day Attacks

The recent spate of zero-day attacks, such as Meltdown and Spectre in early 2018, has put the issue of zero-day threats at the forefront for SecOps teams and security engineers. …

20 Feb /19

Container Security Summit 2019

Brandon Edwards, Capsule8 cofounder & chief scientist, will be speaking on a panel discussing Runtime Security at the Container Security Summit on February 20th. An invitation-only event at Google Parkview …

05 Mar /19

Security Leader VIP Party @ RSA Conference 2019

Join Capsule8 at the Security Leader VIP Party @ RSA Conference 2019! Hosted by Digital Shadows, we’ll have food, drinks, the hottest security vendors in the space, live music and …

04 Mar /19

RSA Conference

We’ll be in attendance at RSA this March taking meetings and hosting happy hours! Grab some time with the Capsule8 team at this premier industry event.

A Look Back at Attacks in 2018

Join Co-founder and Chief Scientist of Capsule8, Brandon Edwards for a review of the worst vulnerabilities and breaches of 2018 and a discussion of what lies ahead.

10 Dec /18

KubeCon + CloudNativeCon

This event gathers adopters and technologists from leading open source and cloud native communities for four days to further the education and advancement of cloud native computing, and we’re going …

The Long Tail of Zero Day Attacks

This webcast takes a look at how companies are still fighting the battle of zero days disclosed months or even years ago, the fallacy of the patch, and why continued …

26 Nov /18

AWS re:Invent

AWS re:Invent is a learning conference hosted by Amazon Web Services for the global cloud computing community. The event features keynote announcements, training and certification opportunities, access to more than …

Spectre and Meltdown | The Data Science Approach

Data science in cybersecurity is rapidly growing. At Capsule8, we in data science work in tandem with the security research team to collaborate on state of the art detection models …

03 Oct /18

Webinar – Climbing Toward Automation: The SOC Hierarchy of Needs

An ineffective Security Operations Center (SOC) puts the security of your entire organization in jeopardy. Your SOC is under attack, facing a constant barrage of data that makes it nearly …

The State of Cloud-Native Security

Capsule8, Duo, and Signal Sciences conducted a survey with 486 IT leaders to better understand the cybersecurity challenges and opportunities of the ongoing shift toward cloud native applications in Production …

The Essential Guide to Cloud-Native Security

Cloud-native security protects applications designed and built on the cloud. On a higher level, “cloud native” is a fundamentally new approach to application design and deployment, leveraging native cloud capabilities …

Docker Security 101: Key Considerations

Docker provides lightweight virtualization that allows multiple isolated Linux systems running on the same host. Unlike traditional virtualization, which virtualizes the hardware, containers virtualize the operating system.  Multiple running containers that …

Preparing for Zero-Day Attacks

Are you one of the 42% of organizations that reported an attack on their hybrid environment in the last year? Discover how you can detect and instantly disrupt attacks in the production …

Preparing for Zero-Day Attacks

Are you one of the 42% of organizations that reported an attack on their hybrid environment in the last year? Discover how you can detect and instantly disrupt attacks in the production …

cloud native security summit
18 Sep /18

Cloud Native Security Summit

The Cloud Native Security Summit is a one-day, exclusive event hosted by Capsule8, Duo, and Signal Sciences, that will bring together senior security practitioners and industry innovators to discuss the …

FS-ISAC Annual Summit
20 May /18

FS-ISAC Annual Summit

Come see Capsule8 in action at the FS-ISAC Annual Summit, the only industry forum for collaboration on critical security threats facing the global financial services sector. We’ll be located in …

RSAC 2018
18 Apr /18

Dino Dai Zovi at RSA: Continuous Security: Securing DevOps and Cloud-Native Environments

The explosive growth of the cloud has transformed how software is developed, deployed and managed. Are you ready to secure this new world? This panel, moderated by Dino Dai Zovi, …

Detecting Meltdown and Spectre

The Meltdown and Spectre vulnerabilities are wreaking havoc on the tech industry and loudly sounding an alarm that even complex, modern processors are still susceptible to big time vulnerabilities. One of …

One Kernel Bug Away: Why Container Security is Such a Challenge

Containers are revolutionizing the way we do application development, but, as with most new technologies, their adoption in the enterprise is (rightfully) hindered by genuine security concerns. Ultimately, containers can …

KubeCon Encore: How To Prevent Attacks At Scale on Cloud-Native Environments

One of the biggest implementation challenges of the cloud-native world of Linux, containers, and microservices is making sure they are secure, but no matter how sure you are, there will …

Headshot of John Viega
07 Dec /17

John Viega at SVB & PWC Cybersecurity Breakfast: Encryption & Eggs

Silicon Valley Bank and PwC are bringing together a panel of experts to discuss best practices to ensure your cybersecurity procedures are up to the requirements of strategic partners. Leading the discussion …

Making Security Operations Scale

As cyber threats continue to escalate, organizations and governments alike are facing the most critical workforce shortage of our time. The current number of experienced cybersecurity professionals is not nearly …

Headshot of Dino Dai
07 Dec /17

Dino Dai Zovi at KubeCon: Preventing Attacks at Scale

Security hardening for containers, clusters, and operating systems is a very important part of setting up infrastructure and always “Plan A”. The world of “Plan A” defends the importance of …

Attacking Kubernetes – Live Security Attacks with Dino Dai Zovi

In this lightning talk, Dino Dai Zovi, CTO at Capsule8, demos some live security attacks against containers running in Kubernetes deployments to illustrate what really needs to be defended against. …

Black Hat Webcast: Scaling Security Operations by Securing DevOps and Automating SecOps
05 Oct /17

Black Hat Webcast: Scaling Security Operations by Securing DevOps and Automating SecOps

As your organization’s environment grows, the effort to properly secure it grows. Every new employee, networked machine, Internet-hosted SaaS solution, line of custom application code, and Smart Whatever increases your …

Securing Cloud-Native Environments: An Interview with Dino Dai Zovi

Capsule8 CEO & Co-Founder Dino Dai Zovi chats with Ed Amoroso of TAG Cyber Media about Capsule8, what we mean by “attack disruption” and challenges in cloud-native security. Watch the …

Headshot of Dino Dai
04 Oct /17

Dino Dai Zovi at O’Reilly Velocity

In this session, Dino will co-present with Jess Frazelle of Google on what it means to have an open source project at a company. What differs between small projects and large? …

Nine Reasons Why the Death of the Security Appliance Is Inevitable

Most security organizations are used to appliances being the workhorse for their protection needs. Indeed, the major security vendors today tend to have huge appliance businesses, including the old titans (e.g., …

Time to Blow Up the SOC?

Thirty-seven percent of SOCs faced more than 10,000 alerts per day and more than half of those were false positives, which can easily cost organizations thousands of wasted hour and …

Time to Sock the SOC?

Your Security Operations Center (SOC) is barraged with so many alerts that your team may be shell shocked into believing that they are under a constant and unmanageable assault. Indeed, …

Capsule8 Product Overview

Capsule8 is the only company providing high-performance attack protection for Linux production environments – whether containerized, virtualized, or bare-metal. Capsule8 liberates SecOps from managing a high volume of manual tasks, …

Dino Dai Zovi at Black Hat
27 Jul /17

Dino Dai Zovi at Black Hat 2017

Datacenter Orchestration Security and Insecurity: Assessing Kubernetes Mesos and Docker at Scale Your datacenter isn’t a bunch of computers, it is *a* computer. While some large organizations have over a …