Uptycs Blog

Welcome! The Uptycs blog is for security professionals and osquery enthusiasts interested in exploring new ideas in cloud security. We hope you’ll enjoy our blog enough to subscribe and share.

Should We Blacklist Newly Registered Domains?

How to Achieve PCI-Compliant FIM and Endpoint Security with One Tool

Why You Need To Embrace User-Focused Security

Deploying osquery for Windows Using GPO (Group Policy Objects)

Best Intrusion Detection Techniques In Cloud Computing

21 Best Linux Resources For Infrastructure Security

Essential Knowledge On Endpoint Security For Linux

Endpoint Security For Mac: What You Need To Know In 2020

Resource Smart YARA Scans: Saving CPU and Time with osquery

How To Use MITRE ATT&CK For Endpoint Security

Osquery vs. OSSEC: Which Is Best for Linux Security in 2020?

Security Analytics and Big Data: 4 Keys To An Effective Approach

Exploring The Critical Components Of DevOps

Introducing usql: An Interactive Command Line Tool for osquery and Uptycs

How To Maximize Your SIEM Benefits

Investigating Threat Alerts with Osquery: Understanding Threat Surface & Risk

Announcing the osquery@scale Conference

Conducting A Vulnerability Assessment: A Step-By-Step Guide For Linux Workloads In The Cloud

Building Your Cyber Security Strategy: A Step-By-Step Guide

3 Cloud Computing Security Issues & How To Get Them Under Control

What Is Cyber Threat Hunting? [2019]

Linux Security Simplified: How To Make Linux More Secure (With Less Work)

Uptycs File Integrity Monitoring Solutions: Security Control, Simplified

[Infographic] macOS Native Security Configurations and osquery

Why Real Time Threat Intelligence Isn’t Enough

[Video] Osquery and 8 macOS Security Best Practices

Building Your First Incident Response Policy: A Practical Guide for Beginners

Performant Osquery – Enterprise-grade Osquery at Scale Considerations

Demisto & Uptycs: Orchestrating Incident Response Activities

Osquery Security Use Cases and Solutions

Hardening defenses with MITRE ATT&CK and osquery: Lessons from Singapore Health Breach

Detecting Malicious Packages in Repositories like PyPI: Using Osquery for Complete Software Inventory

[Video] Incident Investigation with Uptycs and Osquery

Cloud Security: Knowing the Basics

Building a Zero Trust Network (and where osquery fits) - GitLab’s Real Life Roadmap Recap

Checking MDS/Zombieload Mitigations on macOS with Osquery

Remote Desktop Vulnerabilities: Identifying the Exposure and Patch Using Osquery

Threat Hunting with Osquery: 5 macOS Malware Techniques & How to Find Them

The First Curated Osquery Resource Hub

Mac Malware Analysis Using Osquery

Detecting Dirty_Sock with Osquery - A Snapd Privilege Escalation Vulnerability

Windows Registry & Osquery: The Easy Way to Ensure Users are Secured

One Year Later: Ensuring Windows is Protected from Meltdown+Spectre

3 Reasons Your CSIRT Needs Osquery

Hunting for Evil Launch Daemons - Identifying Suspicious Behavior with Osquery

Vulnerabilities in SSD Encryption: Using osquery to Identify Vulnerable Windows Machines

Cloud Compliance for FiServ Requires Merger of 3 Disciplines

Free Osquery Training Course Now On-Demand

Research Report Evaluates Osquery’s Role in Upending Endpoint Security [Complimentary Copy]

Deploying Osquery at Scale: A Comprehensive List of Open Source Tools

How Osquery Helps Secure Your Cloud with These Two Critical CIS Benchmark Controls

How Osquery Will Change The Fragmented Security Market

Secret Agent Mess

Black Hat USA 2018: Targeted Threat Hunting, Managed Everything, Serverless Security and Other Trends

Intro to Osquery: Frequently Asked Questions for Beginners

Composing Defences: The Case for Building Defence in Height

Reflecting on Uptycs Series A Milestone

Osquery In Action: Where and When to Apply "Threat Intel"

Securing Containers: Using osquery to Solve New Challenges Posed by Hosted Orchestration Services

Does osquery violate GDPR rules around Personally Identifiable Data (PII)?

Cloud Workloads: Not the same ol' endpoints

Osquery Security Solutions: Build or Buy?

Open-source hasn't disrupted security...yet

Is your Mac fleet secure? Tackling the myth of inherent mac security

SQL introduction for osquery

Infrastructure Management Has Evolved - Has Your Continuous Monitoring?

6 Tasks for Basic macOS system monitoring with osquery [Video]

How to unistall osquery from macOS in 4 steps [Video]

Finding OSX/CreativeUpdater malware with osquery

Finding OSX/MaMi with osquery

Implementing TLS Persistent Transport Support in osquery 

Quick Update to #iamroot issues

Identifying #iamroot issues with osquery (blank password vuln in macOS 10.13.1)

How to find malware on macs using osquery

Finding browser extensions in osquery [with Video]

Wildcards and globbing in osquery