Uptycs Blog

Welcome! The Uptycs blog is for security professionals and osquery enthusiasts interested in exploring new ideas in cloud security. We hope you’ll enjoy our blog enough to subscribe and share.

[LISTING CONTENT]

SOC 2 Compliance Requirements: Essential Knowledge For Security Audits

SOC 2 Compliance Requirements: Essential Knowledge For Security Audits

For many security-conscious businesses looking for a SaaS provider, SOC 2 compliance is a minimal requirement. Unfortunately, many providers aren't sure how to implement SOC 2 compliance requirements, as they are inherently vague.

8 Docker Security Best Practices To Optimize Your Container System

8 Docker Security Best Practices To Optimize Your Container System

Docker is a software platform that makes it easier to create, deploy, and run applications. It was built so environments would be easy to replicate, giving teams a quick and easy way of deploying programs and updates.

Why You Need To Embrace User-Focused Security

Why You Need To Embrace User-Focused Security

Security of the workstations in your organization is paramount. However, you don’t want to sacrifice employee productivity for security, especially for users who require elevated privileges, such as developers. By embracing user-focused security, companies can empower users to take charge of their own workstation security, and increase company-wide compliance and productivity at the same time.

Best Intrusion Detection Techniques In Cloud Computing

Best Intrusion Detection Techniques In Cloud Computing

Intrusion detection is the practice of monitoring your network, servers, workstations, and other IT assets for any suspicious activity, malicious actions, or violations of some policy. This practice is an integral component of your company’s infrastructure security.

21 Best Linux Resources For Infrastructure Security

21 Best Linux Resources For Infrastructure Security

Infrastructure security at the server layer is a critical aspect of your organization’s overall security posture. When you know the best Linux resources to use, you can prevent attackers from taking over servers or compromising your databases.

How To Use MITRE ATT&CK For Endpoint Security

How To Use MITRE ATT&CK For Endpoint Security

MITRE ATT&CK is a trusted tool in the arsenal of many security teams. When it comes to endpoint security, analysts need to stay proactive to ensure their organization remains resolute in the face of growing threats.

Page 1 of 3: