Uptycs Blog

Welcome! The Uptycs blog is for security professionals and osquery enthusiasts interested in exploring new ideas in cloud security. We hope you’ll enjoy our blog enough to subscribe and share.

Osquery tutorial: How to check disk encryption on Mac, Linux, and Windows

Osquery tutorial: How to check disk encryption on Mac, Linux, and Windows

As user-driven security expands, the need for securing user-managed systems grows. Disk encryption is an essential and straightforward way to shore up user security.

Addressing critical Windows DNS Server remote code execution vulnerability CVE-2020-1350

Addressing critical Windows DNS Server remote code execution vulnerability CVE-2020-1350

Microsoft released multiple security updates on Tuesday, July 14, including one for a remote code execution vulnerability for their DNS server.

Why You Need To Embrace User-Focused Security

Why You Need To Embrace User-Focused Security

Security of the workstations in your organization is paramount. However, you don’t want to sacrifice employee productivity for security, especially for users who require elevated privileges, such as developers. By embracing user-focused security, companies can empower users to take charge of their own workstation security, and increase company-wide compliance and productivity at the same time.

Building Your Cyber Security Strategy: A Step-By-Step Guide

Building Your Cyber Security Strategy: A Step-By-Step Guide

A cyber security strategy is fundamental in helping your company take a proactive approach to security instead of reacting to every new threat, which can be time consuming and expensive. Whether you have an outdated strategy in place or you are starting from scratch, you can use this guide to get started building an effective and strategic cyber security plan.