Uptycs Blog

Welcome! The Uptycs blog is for security professionals and osquery enthusiasts interested in exploring new ideas in cloud security. We hope you’ll enjoy our blog enough to subscribe and share.

Security Insights for Linux, macOS and Containers | endpoint security

Endpoint Visibility: 5 Best Practices To Optimize Your Security

Endpoint Visibility: 5 Best Practices To Optimize Your Security

Endpoint visibility is crucial because most attacks begin on endpoints used by people—not the firewall or your servers. Typically, attackers gain control over these entry points to the network through techniques like phishing; from there, they can move laterally to access your servers. This type of activity currently accounts for over 80% of reported incidents, according to CSO.

Should We Blacklist Newly Registered Domains?

Should We Blacklist Newly Registered Domains?

Uptycs' threat intelligence team collects over a million indicators every week to provide the latest threat data. All of this data is downloaded from more than 40 publicly available sources which we then put into eight categories including:

How to Achieve PCI-Compliant FIM and Endpoint Security with One Tool

How to Achieve PCI-Compliant FIM and Endpoint Security with One Tool

Monitoring critical system files, configuration files, and content files for unusual or unauthorized activity is one of the core requirements of the PCI-DSS, the payment card industry’s security standard. As such, file integrity monitoring (FIM) is a necessary activity for companies that process or store credit card data. Security teams can choose from any number of endpoint security tools to handle FIM for PCI compliance, but some solutions do more than others.

Why You Need To Embrace User-Focused Security

Why You Need To Embrace User-Focused Security

Security of the workstations in your organization is paramount. However, you don’t want to sacrifice employee productivity for security, especially for users who require elevated privileges, such as developers. By embracing user-focused security, companies can empower users to take charge of their own workstation security, and increase company-wide compliance and productivity at the same time.

Essential Knowledge On Endpoint Security For Linux

Essential Knowledge On Endpoint Security For Linux

Linux endpoint security is a more prevalent topic now than it was a decade ago. With the rapid growth of the SaaS industry, many significant applications in cloud environments now rely on Linux.

Endpoint Security For Mac: What You Need To Know In 2020

Endpoint Security For Mac: What You Need To Know In 2020

For a long time, Mac security threats weren’t a top of mind concern for security teams and vendors, who primarily focused on securing Windows where they had a much larger footprint. Now, many employees are using Macs to access production infrastructure, presenting new avenues for attackers to exploit.

Page 1 of 2: