Uptycs Blog

Welcome! The Uptycs blog is for security professionals and osquery enthusiasts interested in exploring new ideas in cloud security. We hope you’ll enjoy our blog enough to subscribe and share.

[LISTING CONTENT]

Why You Need To Embrace User-Focused Security

Why You Need To Embrace User-Focused Security

Security of the workstations in your organization is paramount. However, you don’t want to sacrifice employee productivity for security, especially for users who require elevated privileges, such as developers. By embracing user-focused security, companies can empower users to take charge of their own workstation security, and increase company-wide compliance and productivity at the same time.

Best Intrusion Detection Techniques In Cloud Computing

Best Intrusion Detection Techniques In Cloud Computing

Intrusion detection is the practice of monitoring your network, servers, workstations, and other IT assets for any suspicious activity, malicious actions, or violations of some policy. This practice is an integral component of your company’s infrastructure security.

21 Best Linux Resources For Infrastructure Security

21 Best Linux Resources For Infrastructure Security

Infrastructure security at the server layer is a critical aspect of your organization’s overall security posture. When you know the best Linux resources to use, you can prevent attackers from taking over servers or compromising your databases.

How To Use MITRE ATT&CK For Endpoint Security

How To Use MITRE ATT&CK For Endpoint Security

MITRE ATT&CK is a trusted tool in the arsenal of many security teams. When it comes to endpoint security, analysts need to stay proactive to ensure their organization remains resolute in the face of growing threats.

Security Analytics and Big Data: 4 Keys To An Effective Approach

Security Analytics and Big Data: 4 Keys To An Effective Approach

Proper security analytics require big data—a fact that companies are increasingly starting to recognize. Nearly 30% of organizations claim they are collecting, processing, and analyzing significantly more security data than they did two years ago, and 42% acknowledge the future importance of leveraging big data for security purposes. But at the same time, only 13% of companies believe their IT security stack is up to the task of effectively collecting and analyzing data organization-wide.

Linux Security Simplified: How To Make Linux More Secure (With Less Work)

Linux Security Simplified: How To Make Linux More Secure (With Less Work)

Linux is a versatile operating system. Its use cases vary greatly, from hosting hundreds of containers across a complex network, to running a single desktop, to the operating systems of TVs, Android phones and most Internet of Things (IoT) devices.

Page 1 of 2: