Uptycs Blog

Welcome! The Uptycs blog is for security professionals and osquery enthusiasts interested in exploring new ideas in cloud security. We hope you’ll enjoy our blog enough to subscribe and share.

Building Your Cyber Security Strategy: A Step-By-Step Guide

Building Your Cyber Security Strategy: A Step-By-Step Guide

A cyber security strategy is fundamental in helping your company take a proactive approach to security instead of reacting to every new threat, which can be time consuming and expensive. Whether you have an outdated strategy in place or you are starting from scratch, you can use this guide to get started building an effective and strategic cyber security plan.

3 Cloud Computing Security Issues & How To Get Them Under Control

3 Cloud Computing Security Issues & How To Get Them Under Control

Businesses are enthusiastically adopting cloud computing as a cost-saving technology, and it’s no wonder, the business case for cloud technology speaks for itself: reduced asset depreciation, remarkably agile resources that can scale up or down within minutes, and fewer staff to maintain it. Unfortunately, this is only part of the picture.

What Is Cyber Threat Hunting? [2019]

What Is Cyber Threat Hunting? [2019]

Threats to cyber security have been around for decades, but the sophistication and motivations of attackers have evolved. In the early days, they carried out relatively simple, insignificant attacks in an attempt to show off their programming abilities; now, sophisticated cybercriminals (sometimes sponsored by governments and companies) launch serious attacks to steal products and ideas, or other data, from digital infrastructure.

Linux Security Simplified: How To Make Linux More Secure (With Less Work)

Linux Security Simplified: How To Make Linux More Secure (With Less Work)

Linux is a versatile operating system. Its use cases vary greatly, from hosting hundreds of containers across a complex network, to running a single desktop, to the operating systems of TVs, Android phones and most Internet of Things (IoT) devices.

Uptycs File Integrity Monitoring Solutions: Security Control, Simplified

Uptycs File Integrity Monitoring Solutions: Security Control, Simplified

Knowing how files are being accessed within a network, and by whom, is an important part of a security team’s global security program. But finding the right file integrity monitoring software can be a challenge, particularly when you’re managing a hybrid of cloud and on-premises infrastructure across macOS, Linux, and Windows.

[Infographic] macOS Native Security Configurations and osquery

[Infographic] macOS Native Security Configurations and osquery

Be it for macOS or my dog eating out of the trash, there is no such thing as a bullet-proof security policy. It’s all about creating a threshold of standards- something to work off of while simultaneously reducing overall risk (you know, like storing your trash can on the counter, for example).

Page 7 of 16: