Osquery: What it is, how it works, and how to use it
Maintaining visibility into infrastructure and operating systems is critical for all organizations today—compliance, security, and your bottom line depend on it.
Good news: Uptycs Series B funding
I’m excited to share that we’ve raised $30M in Series B funding led by Sapphire Ventures. This is a significant milestone for Uptycs. Jai Das from Sapphire Ventures led the round with participation from existing investors Comcast Ventures and ForgePoint Capital. It was an oversubscribed round with no room for additional investors. This serves as a testament to our strong customer relationships, our current success as a venture, and the excitement around the space of SQL-powered security analytics.
Tagged as: osquery, cloud security, security analytics, Announcement
Should We Blocklist Newly Registered Domains?
Uptycs' threat intelligence team collects over a million indicators every week to provide the latest threat data. All of this data is downloaded from more than 40 publicly available sources which we then put into eight categories including:
Tagged as: threat intelligence, security analytics, endpoint security
Resource smart YARA scans: Saving CPU and time with osquery
As attackers continually evolve their tactics, the arsenal of tools at hand for defenders needs to respond to attacker complexity while still enabling day-to-day business to happen.
When it comes to detecting malware, the arms race between attackers and defenders is certainly nothing new. The once seemingly simple battle between nuisance script kiddie worms and simple anti-virus software evolved over time into a much more complex and layered approach towards stopping powerful weapons against organizations to extort, incur damages, and steal intellectual property. For a long time now, malware-detection technologies have become more sophisticated as malware works harder than ever to gain access to a target machine and then conceal its presence as it runs.
Tagged as: malware, threat hunting, security analytics, endpoint security, yara
How To Use MITRE ATT&CK For Endpoint Security
MITRE ATT&CK is a trusted tool in the arsenal of many security teams. When it comes to endpoint security, analysts need to stay proactive to ensure their organization remains resolute in the face of growing threats.
Tagged as: security analytics, endpoint security
Proper security analytics require big data—a fact that companies are increasingly starting to recognize. Nearly 30% of organizations claim they are collecting, processing, and analyzing significantly more security data than they did two years ago, and 42% acknowledge the future importance of leveraging big data for security purposes. But at the same time, only 13% of companies believe their IT security stack is up to the task of effectively collecting and analyzing data organization-wide.
Tagged as: security analytics
Subscribe for new posts
Popular Posts
- Building Your Cyber Security Strategy: A Step-By-Step Guide
- 8 Docker Security Best Practices To Optimize Your Container System
- Intro to Osquery: Frequently Asked Questions for Beginners
- SOC 2 Compliance Requirements: Essential Knowledge For Security Audits
- Warzone RAT comes with UAC bypass technique