Uptycs Blog

Welcome! The Uptycs blog is for security professionals and osquery enthusiasts interested in exploring new ideas in cloud security. We hope you’ll enjoy our blog enough to subscribe and share.

What’s the difference between CASB, CWPP, CSPM, and CNAPP?

What’s the difference between CASB, CWPP, CSPM, and CNAPP?

As enterprises shift their workloads to the cloud, securing cloud environments has become an imperative. 

Gartner forecasts that worldwide public cloud spending will increase by 18.4% in 2021 to a total of $304.9 billion. The market research firm predicts that the proportion of IT spending shifting to the cloud will accelerate, with the cloud projected to make up 14.2% of the total global enterprise IT spending market in 2024, up from 9.1% in 2020.

What you need to know about CWPP (cloud workload protection platform)

What you need to know about CWPP (cloud workload protection platform)

Organizations are accelerating their migrations to the cloud while continuing to use on-premises systems. This cloud/on-prem mix offers big upsides in flexibility and scalability, but it also makes it hard to protect an organization’s shifting attack surface.

Use cloudquery and osquery to simplify your cloud monitoring

Use cloudquery and osquery to simplify your cloud monitoring

With the shift toward cloud computing, many organizations have at least some footprint in the cloud. Thus it becomes important to secure both your on-prem and cloud infrastructure.

Cloudquery, which runs as an extension of osquery, simplifies the visualization and monitoring of all your cloud resources. It creates a seamless integration of cloud telemetry with the rest of your osquery-powered telemetry.

Continuously monitor your cloud infrastructure to improve cloud security posture

Continuously monitor your cloud infrastructure to improve cloud security posture

What’s the single biggest thing you can do to improve your cloud security posture? It’s not detecting advanced malware developed by nation states. You can dramatically improve your cloud security with a far more mundane task: making sure your cloud resources are configured correctly.

Good news: Uptycs Series B funding

Good news: Uptycs Series B funding

I’m excited to share that we’ve raised $30M in Series B funding led by Sapphire Ventures. This is a significant milestone for Uptycs. Jai Das from Sapphire Ventures led the round with participation from existing investors Comcast Ventures and ForgePoint Capital. It was an oversubscribed round with no room for additional investors. This serves as a testament to our strong customer relationships, our current success as a venture, and the excitement around the space of SQL-powered security analytics.

Best Intrusion Detection Techniques In Cloud Computing

Best Intrusion Detection Techniques In Cloud Computing

Intrusion detection is the practice of monitoring your network, servers, workstations, and other IT assets for any suspicious activity, malicious actions, or violations of some policy. This practice is an integral component of your company’s infrastructure security.

Page 1 of 3: