Uptycs Blog

Welcome! The Uptycs blog is for security professionals and osquery enthusiasts interested in exploring new ideas in cloud security. We hope you’ll enjoy our blog enough to subscribe and share.

[LISTING CONTENT]

Conducting A Vulnerability Assessment: A Step-By-Step Guide For Linux Workloads In The Cloud

Conducting A Vulnerability Assessment: A Step-By-Step Guide For Linux Workloads In The Cloud

Being proactive about protecting your systems, networks, applications and critical data is a cornerstone of a robust, successful security program. Having a vulnerability assessment plan is a way of doing just that—proactively identifying weaknesses within your systems, so you can shore them up before attackers find and take advantage of them.

Uptycs File Integrity Monitoring Solutions: Security Control, Simplified

Uptycs File Integrity Monitoring Solutions: Security Control, Simplified

Knowing how files are being accessed within a network, and by whom, is an important part of a security team’s global security program. But finding the right file integrity monitoring software can be a challenge, particularly when you’re managing a hybrid of cloud and on-premises infrastructure across macOS, Linux, and Windows.

[Video] Incident Investigation with Uptycs and Osquery

[Video] Incident Investigation with Uptycs and Osquery

 

This video features Pat Haley, our Principal Sales Engineer, walking through the strengths and challenges of osquery, how osquery can be used for incident investigations, and how Uptycs can add value to an osquery deployment of any size.

Page 2 of 2: