Linux Security Simplified: How To Make Linux More Secure (With Less Work)

Uptycs File Integrity Monitoring Solutions: Security Control, Simplified

[Infographic] macOS Native Security Configurations and osquery

Why Real Time Threat Intelligence Isn’t Enough

[Video] Osquery and 8 macOS Security Best Practices

Building Your First Incident Response Policy: A Practical Guide for Beginners

Performant Osquery – Enterprise-grade Osquery at Scale Considerations

Demisto & Uptycs: Orchestrating Incident Response Activities

Osquery Security Use Cases and Solutions

Hardening defenses with MITRE ATT&CK and osquery: Lessons from Singapore Health Breach

Detecting Malicious Packages in Repositories like PyPI: Using Osquery for Complete Software Inventory

[Video] Incident Investigation with Uptycs and Osquery

Cloud Security: Knowing the Basics

Building a Zero Trust Network (and where osquery fits) - GitLab’s Real Life Roadmap Recap

Checking MDS/Zombieload Mitigations on macOS with Osquery

Remote Desktop Vulnerabilities: Identifying the Exposure and Patch Using Osquery

Threat Hunting with Osquery: 5 macOS Malware Techniques & How to Find Them

The First Curated Osquery Resource Hub

Mac Malware Analysis Using Osquery

Detecting Dirty_Sock with Osquery - A Snapd Privilege Escalation Vulnerability

Windows Registry & Osquery: The Easy Way to Ensure Users are Secured

One Year Later: Ensuring Windows is Protected from Meltdown+Spectre

3 Reasons Your CSIRT Needs Osquery

Hunting for Evil Launch Daemons - Identifying Suspicious Behavior with Osquery

Vulnerabilities in SSD Encryption: Using osquery to Identify Vulnerable Windows Machines

Cloud Compliance for FiServ Requires Merger of 3 Disciplines

Free Osquery Training Course Now On-Demand

Research Report Evaluates Osquery’s Role in Upending Endpoint Security [Complimentary Copy]

Deploying Osquery at Scale: A Comprehensive List of Open Source Tools

How Osquery Helps Secure Your Cloud with These Two Critical CIS Benchmark Controls

How Osquery Will Change The Fragmented Security Market

Secret Agent Mess

Black Hat USA 2018: Targeted Threat Hunting, Managed Everything, Serverless Security and Other Trends

Intro to Osquery: Frequently Asked Questions for Beginners

Composing Defences: The Case for Building Defence in Height

Reflecting on Uptycs Series A Milestone

Osquery In Action: Where and When to Apply "Threat Intel"

Securing Containers: Using osquery to Solve New Challenges Posed by Hosted Orchestration Services

Does osquery violate GDPR rules around Personally Identifiable Data (PII)?

Cloud Workloads: Not the same ol' endpoints

Osquery Security Solutions: Build or Buy?

Open-source hasn't disrupted security...yet

Is your Mac fleet secure? Tackling the myth of inherent mac security

SQL introduction for osquery

Infrastructure Management Has Evolved - Has Your Continuous Monitoring?

6 Tasks for Basic macOS system monitoring with osquery [Video]

How to unistall osquery from macOS in 4 steps [Video]

Finding OSX/CreativeUpdater malware with osquery

Finding OSX/MaMi with osquery

Implementing TLS Persistent Transport Support in osquery 

Quick Update to #iamroot issues

Identifying #iamroot issues with osquery (blank password vuln in macOS 10.13.1)

How to find malware on macs using osquery

Finding browser extensions in osquery [with Video]

Wildcards and globbing in osquery

Uptycs Blog | Cloud Security Trends and Analysis

Welcome! The Uptycs blog is for security professionals and osquery enthusiasts interested in exploring new ideas in cloud security. We hope you'll enjoy our blog enough to subscribe, share and comment.

Subscribe for New Posts

Find Uptycs Everywhere

Recommended Reads