Resources

Black Hat
Catch Up with the Capsule8 Team at Black Hat Schedule a Meeting Our Speaking Sessions Controlled Chaos: The Inevitable Marriage of DevOps & Security We’ve all heard “software is eating the world” – that most organizations are becoming software organizations in some form. In this new era, DevOps rises as the engine of the business, […]
Optiv’s 2019 NorCal Golf Tournament
Capsule8 is a sponsor at the 2019 NorCal Golf Tournament hosted by Optiv. Spend a day on the links with us and other security professionals.
QCon New York
Proud to announce that our VP of Product Strategy, Kelly Shortridge, will be speaking at this year’s event! This is one that you won’t want to miss.
FutureCon Detroit
Come visit the Capsule8 team at FutureCon Detroit! If you plan on attending, come stop by and say hello.
Capsule8 Protect for File Integrity Monitoring
File integrity monitoring (FIM) is an important tool for you to monitor changes to critical systems, configuration and content files within your enterprise. Learn how Capsule8 Protect takes care of all the compliance issues your current FIM solution handles and adds key security capabilities.
Compliance and A False Sense of Security
Understand in depth the unique challenges of compliance in this new cloud-native world, as well as share best practices for not only meeting compliance standards, but truly protecting your production environment.
Happy Hour at AWS re:Inforce
Join the Capsule8 and Signal Sciences teams for a Happy Hour at Legal Harborside to kick off the inaugural AWS re:Inforce event!
Capsule8 Protect
Capsule8 Protect is the Linux protection solution that keeps production environments free of compromise while preserving the high performance and reliability on which modern organizations depend. Read our whitepaper to learn about our approach.
Doing DevSecOps Right: Implementation & the Metrics that Matter
Join Amy DeMartine and Kelly Shortridge, vice president of product strategy at Capsule8, to learn not only how to implement DevSecOps, but also the KPIs and metrics you should measure to make sure your company is continuously reducing risk.
AWS re:Inforce
Catch up with the Capsule8 team at AWS re:Inforce this June at a meeting or happy hour event at this premiere event.
Driving Toward the Automated SOC
SOCs need to be empowered: boosting the accuracy of threat detection and shortening the time to response – and doing it in a scalable way that doesn’t rely on hiring increasingly hard-to-find security personnel. Automation will be increasingly critical to a SOC’s ability to protect the enterprise.
An Overview of Capsule8 for Operations
Read this primer to understand how Capsule8 has been architected to alleviate and mitigate concerns raised by operations stakeholders charged with optimizing the performance of production infrastructure.
Capsule8 for PCI Compliance
As businesses look to comply and, more importantly, protect cardholder data across Linux-based environments whether in the data center or cloud, Capsule8 delivers. Download this Solutions Brief to learn how Capsule8 satisfies PCI DSS requirements.
Demo: Detection Capabilities of Capsule8 Protect
Learn how Capsule8 Protect delivers the right kind of data, at the right time – for each stage in an attack’s lifecycle. Because we’re detecting attacks from multiple vantage points within the system, we detect evidence of exploitation as soon as it happens — and help our customers stop the attack from progressing.
ODSC East
ODSC East 2019 is one of the largest applied data science conferences in the world. Harini Kannan, one of Capsule8’s data scientists, will be presenting “Machine learning To Detect Cyber Attacks: A Case Study” in the AI Solution Showcase on Wednesday, May 1 at 11:30 am in the East AI Expo Hall. Machine learning To […]
Resilient Infrastructure
Digging Down into Resilient Infrastructure
During our 20/20 webcast Resilience is not futile, we discussed the importance of building resilience into your security program. As we continue our discussion on cyber resilience, we’ll take a deeper dive into determining your resilience, looking at what components constitute a resilient framework and how to measure if your framework is making an impact. […]
Capsule8’s Attack Detection Methods
Gain technical insight into Capsule8’s design philosophy behind detection methods as well as insight into the differences between kernel-level, userland, file system, and network detection methods.
Photo by jonathan riley on Unsplash
Resilience is Not Futile
Not every company is able to survive a breach or disaster. Poor planning, such as having your server backups in the same general area as your data center after an earthquake or flood, or a poorly defined incident response plan could lead to a company not being able to restore their systems after a breach […]
How to Detect and Mitigate Zero-Day Attacks
The recent spate of zero-day attacks, such as Meltdown and Spectre in early 2018, has put the issue of zero-day threats at the forefront for SecOps teams and security engineers. Despite the increased urgency in understanding the threat itself, there’s still some confusion about what is meant by a “zero-day attack.”
Container Security Summit 2019
Brandon Edwards, Capsule8 cofounder & chief scientist, will be speaking on a panel discussing Runtime Security at the Container Security Summit on February 20th. An invitation-only event at Google Parkview in Seattle, Brandon will join container security experts for a day of panels and presentations to help security professionals increase the security of their container […]
Security Leader VIP Party @ RSA Conference 2019
Join Capsule8 at the Security Leader VIP Party @ RSA Conference 2019! Hosted by Digital Shadows, we’ll have food, drinks, the hottest security vendors in the space, live music and a great view from City View @ The Metreon! This party is open to every security practitioner and leader attending RSA Conference 2019 but space […]
1 3 4 5 6 7