Resources

Quick reads, e-books and more to give you a deeper understanding of cloud-native security and Capsule8 offerings.

Filter
10 Dec /18

KubeCon + CloudNativeCon

This event gathers adopters and technologists from leading open source and cloud native communities for four days to further the education and advancement of cloud native computing, and we’re going …

SC 20/20 Webcast – Zero Day and Counting

This webcast takes a look at how companies are still fighting the battle of zero days disclosed months or even years ago, the fallacy of the patch, and why continued …

26 Nov /18

AWS re:Invent

AWS re:Invent is a learning conference hosted by Amazon Web Services for the global cloud computing community. The event features keynote announcements, training and certification opportunities, access to more than …

15 Nov /18

Webinar – Zero Day and Counting

When a zero-day vulnerability hits the headlines, alarms sound throughout the industry to figure out how to protect themselves against it. How do we detect it? How will this impact …

Spectre and Meltdown | The Data Science Approach

Data science in cybersecurity is rapidly growing. At Capsule8, we in data science work in tandem with the security research team to collaborate on state of the art detection models …

03 Oct /18

Webinar – Climbing Toward Automation: The SOC Hierarchy of Needs

An ineffective Security Operations Center (SOC) puts the security of your entire organization in jeopardy. Your SOC is under attack, facing a constant barrage of data that makes it nearly …

The State of Cloud-Native Security

Capsule8, Duo, and Signal Sciences conducted a survey with 486 IT leaders to better understand the cybersecurity challenges and opportunities of the ongoing shift toward cloud native applications in Production …

The Essential Guide to Cloud-Native Security

Cloud-native security protects applications designed and built on the cloud. On a higher level, “cloud native” is a fundamentally new approach to application design and deployment, leveraging native cloud capabilities …

Docker Security 101: Key Considerations

Docker provides lightweight virtualization that allows multiple isolated Linux systems running on the same host. Unlike traditional virtualization, which virtualizes the hardware, containers virtualize the operating system.  Multiple running containers that …

Preparing for Zero-Day Attacks

Are you one of the 42% of organizations that reported an attack on their hybrid environment in the last year? Discover how you can detect and instantly disrupt attacks in the production …

Preparing for Zero-Day Attacks

Are you one of the 42% of organizations that reported an attack on their hybrid environment in the last year? Discover how you can detect and instantly disrupt attacks in the production …

cloud native security summit
18 Sep /18

Cloud Native Security Summit

The Cloud Native Security Summit is a one-day, exclusive event hosted by Capsule8, Duo, and Signal Sciences, that will bring together senior security practitioners and industry innovators to discuss the …

FS-ISAC Annual Summit
20 May /18

FS-ISAC Annual Summit

Come see Capsule8 in action at the FS-ISAC Annual Summit, the only industry forum for collaboration on critical security threats facing the global financial services sector. We’ll be located in …

Capsule8: How It Works

See how Capsule8 works to detect and disrupt zero-day attacks in real time in this short video overview.

RSAC 2018
18 Apr /18

Dino Dai Zovi at RSA: Continuous Security: Securing DevOps and Cloud-Native Environments

The explosive growth of the cloud has transformed how software is developed, deployed and managed. Are you ready to secure this new world? This panel, moderated by Dino Dai Zovi, …

Detecting Meltdown and Spectre

The Meltdown and Spectre vulnerabilities are wreaking havoc on the tech industry and loudly sounding an alarm that even complex, modern processors are still susceptible to big time vulnerabilities. One of …

One Kernel Bug Away: Why Container Security is Such a Challenge

Containers are revolutionizing the way we do application development, but, as with most new technologies, their adoption in the enterprise is (rightfully) hindered by genuine security concerns. Ultimately, containers can …

KubeCon Encore: How To Prevent Attacks At Scale on Cloud-Native Environments

One of the biggest implementation challenges of the cloud-native world of Linux, containers, and microservices is making sure they are secure, but no matter how sure you are, there will …

Headshot of John Viega
07 Dec /17

John Viega at SVB & PWC Cybersecurity Breakfast: Encryption & Eggs

Silicon Valley Bank and PwC are bringing together a panel of experts to discuss best practices to ensure your cybersecurity procedures are up to the requirements of strategic partners. Leading the discussion …

Making Security Operations Scale

As cyber threats continue to escalate, organizations and governments alike are facing the most critical workforce shortage of our time. The current number of experienced cybersecurity professionals is not nearly …

Headshot of Dino Dai
07 Dec /17

Dino Dai Zovi at KubeCon: Preventing Attacks at Scale

Security hardening for containers, clusters, and operating systems is a very important part of setting up infrastructure and always “Plan A”. The world of “Plan A” defends the importance of …

Attacking Kubernetes – Live Security Attacks with Dino Dai Zovi

In this lightning talk, Dino Dai Zovi, CTO at Capsule8, demos some live security attacks against containers running in Kubernetes deployments to illustrate what really needs to be defended against. …

Black Hat Webcast: Scaling Security Operations by Securing DevOps and Automating SecOps
05 Oct /17

Black Hat Webcast: Scaling Security Operations by Securing DevOps and Automating SecOps

As your organization’s environment grows, the effort to properly secure it grows. Every new employee, networked machine, Internet-hosted SaaS solution, line of custom application code, and Smart Whatever increases your …

Securing Cloud-Native Environments: An Interview with Dino Dai Zovi

Capsule8 CEO & Co-Founder Dino Dai Zovi chats with Ed Amoroso of TAG Cyber Media about Capsule8, what we mean by “attack disruption” and challenges in cloud-native security. Watch the …

Headshot of Dino Dai
04 Oct /17

Dino Dai Zovi at O’Reilly Velocity

In this session, Dino will co-present with Jess Frazelle of Google on what it means to have an open source project at a company. What differs between small projects and large? …

Nine Reasons Why the Death of the Security Appliance Is Inevitable

Most security organizations are used to appliances being the workhorse for their protection needs. Indeed, the major security vendors today tend to have huge appliance businesses, including the old titans (e.g., …

Time to Blow Up the SOC?

Thirty-seven percent of SOCs faced more than 10,000 alerts per day and more than half of those were false positives, which can easily cost organizations thousands of wasted hour and …

Time to Sock the SOC?

Your Security Operations Center (SOC) is barraged with so many alerts that your team may be shell shocked into believing that they are under a constant and unmanageable assault. Indeed, …

Capsule8 Product Overview

Capsule8 is the industry’s first real-time, zero-day attack detection platform built to scale to massive deployments. Capsule8 Protect brings continuous security to your entire production infrastructure, allowing you to detect …

Dino Dai Zovi at Black Hat
27 Jul /17

Dino Dai Zovi at Black Hat 2017

Datacenter Orchestration Security and Insecurity: Assessing Kubernetes Mesos and Docker at Scale Your datacenter isn’t a bunch of computers, it is *a* computer. While some large organizations have over a …