Resources

Product datasheets, technical whitepapers and guides, webinars, events, and more educational resources to help you learn about securing production Linux environments.
  • All
  • Analyst Reports
  • Datasheets
  • Infographics
  • Quick Reads
  • Video
  • Webinars
  • Whitepapers
All
  • All
  • Analyst Reports
  • Datasheets
  • Infographics
  • Quick Reads
  • Video
  • Webinars
  • Whitepapers
Photo by jonathan riley on Unsplash breach

Resilience is Not Futile

Not every company is able to survive a breach or disaster. Poor planning, such as having your server backups in …

Read More →
zero-days-wp-web Whitepapers

How to Detect and Mitigate Zero-Day Attacks

The recent spate of zero-day attacks, such as Meltdown and Spectre in early 2018, has put the issue of zero-day …

Read More →
Photo by Devon Janse van Rensburg on Unsplash Webinars

A Look Back at Attacks in 2018

Join Co-founder and Chief Scientist of Capsule8, Brandon Edwards for a review of the worst vulnerabilities and breaches of 2018 …

Read More →
webinar-long-tail-zero-day-attacks Webinars

The Long Tail of Zero Day Attacks

This webcast takes a look at how companies are still fighting the battle of zero days disclosed months or even …

Read More →
cloud-native-security capsule8

Spectre and Meltdown | The Data Science Approach

Data science in cybersecurity is rapidly growing. At Capsule8, we in data science work in tandem with the security research …

Read More →
c8_stateofcloudnative_preview_2_17sep18 Whitepapers

The State of Cloud-Native Security

Capsule8, Duo, and Signal Sciences conducted a survey with 486 IT leaders to better understand the cybersecurity challenges and opportunities …

Read More →
cloud-native-security detection

The Essential Guide to Cloud-Native Security

Modern detection engineering requires the adoption of engineering principles to security analysis. In a cloud native system, this practice becomes …

Read More →
cloud-native-security containers

Docker Security 101: Key Considerations

Docker and containers bring true platform independence, agility, and flexibility to running applications. As the industry moves toward microservices, containers, …

Read More →
zero-day-attacks-title-image-slideshare-cropped environment

Preparing for Zero-Day Attacks

Are you one of the 42% of organizations that reported an attack on their hybrid environment in the last year? Discover …

Read More →
Scroll to Top