Uptycs Blog

Welcome! The Uptycs blog is for security professionals and osquery enthusiasts interested in exploring new ideas in cloud security. We hope you’ll enjoy our blog enough to subscribe and share.

What Are Cloud Workload Security Best Practices?

What Are Cloud Workload Security Best Practices?

We’ve posted quite a bit about how more companies are shifting their workloads to the cloud. But a key question is how do you secure those workloads in the cloud? With some many different permutations of cloud workloads, from virtual machines, to endpoints, to containers, getting started with how to secure it all can seem a little overwhelming? So what are some cloud workload security best practices?

Is The Cloud Secure?

Is The Cloud Secure?

It’s no longer an on-prem world. For years we’ve all heard about the disappearing security perimeter, the shift to SaaS, cloud-based workloads and new concepts like containers and Kubernetes. For years tech marketing and airport billboards have promised that the cloud can help your organization scale, become more competitive and transform your business. Which it can, but for many organizations, particularly those in highly regulated industries, the question remains:

What Does Cloud Native Mean?

What Does Cloud Native Mean?

“Digital transformation” has been one of the biggest buzzwords of the last decade-- and has come to mean many things to many people. But the biggest manifestation that most workers have come to encounter has been the shift to the cloud. As more organizations move away from purchasing costly on-site servers and locally installed software, a new breed of IT infrastructure has sprung up termed ‘cloud native.’

6 Tips for Evaluating A Cloud Security Solution

6 Tips for Evaluating A Cloud Security Solution

Securing your data and devops environments has never been harder. As digital transformation accelerates and more of the business moves to the cloud, the job of cybersecurity teams has never been more difficult. With cloud deployments scattered across multicloud and hybrid environments, and touching nearly every facet of the business, it’s both harder and more important than ever to ensure that you have full visibility into all of your cloud controls.

6 Cloud Security Podcasts You Should Be Listening To

6 Cloud Security Podcasts You Should Be Listening To

In the last 10 years podcasts have gone from an obscure internet oddity (originally using the RSS format to spread audio information) to creating a new golden age of radio. From true crime to horror fiction to covering any professional topic imaginable, there’s a podcast out there for everyone.

And that includes cybersecurity pro’s. No matter what aspect of security you’re involved with or interested in, there’s a podcast that can help you learn more, grow your skills, give you a new perspective, or make you laugh.

15 Must Watch Cybersecurity Movies For Cloud Security Pro’s

15 Must Watch Cybersecurity Movies For Cloud Security Pro’s

Movies are a powerful part of our modern culture and influence us in ways we seldom think about—from the clothes we wear to the music we listen to...even our career choices and how we think about them. Over the years technology has played an ever bigger role in our lives, and that’s been reflected in films of the past 40 years. But as technology has become a thematic element, exploiting it and securing it has also emerged as a major part of film, and that’s had a profound influence over the years on both the technology and cybersecurity industries, both as a source of inspiration...or as just something to laugh about or have fun with.

Page 1 of 4: