MITRE ATT&CK Framework Q&A with Forrester Research

Following a successful webcast, Capsule8 commissioned Forrester to share insights into the MITRE ATT&CK Framework. Josh Zelonis, principal analyst, provides Forrester’s analysis in the following Q&A.

Understanding Indicators of Attack vs Compromise

Understanding Indicators of Attack vs Compromise It’s the choice between stopping an attack before it gets in or detecting a compromise after it affects your company There are two main …

The Cloud Native Compliance Playbook: Strategies for the Enterprise

The reality for most organizations is that they are somewhere between hybrid cloud and cloud native on their cloud transformation journeys. A major roadblock for this delay is compliance – …

Spectre and Meltdown | The Data Science Approach

Data science in cybersecurity is rapidly growing. At Capsule8, we in data science work in tandem with the security research team to collaborate on state of the art detection models …

The Essential Guide to Cloud-Native Security

Modern detection engineering requires the adoption of engineering principles to security analysis. In a cloud native system, this practice becomes existentially critical — without it, security detection will be untenable.

Docker Security 101: Key Considerations

Docker and containers bring true platform independence, agility, and flexibility to running applications. As the industry moves toward microservices, containers, and cloud-native environments, container and Docker security will be taking …

Preparing for Zero-Day Attacks

Are you one of the 42% of organizations that reported an attack on their hybrid environment in the last year? Discover how you can detect and instantly disrupt attacks in the production …

Why Container Security is Such a Challenge

Container Security Why Container Security is such a Challenge The Power of Containers Containers are having a moment. They are revolutionizing the way we do application development, but, as with …

Nine Reasons Why the Death of the Security Appliance Is Inevitable

Most security organizations are used to appliances being the workhorse for their protection needs. Indeed, the major security vendors today tend to have huge appliance businesses, including the old titans (e.g., …