Uptycs Blog
Uptycs Blog for security professionals and osquery enthusiasts interested in exploring new ideas in securing and monitoring Linux, macOS, container and cloud workloads.

Endpoint Security For Mac: What You Need To Know In 2020
For a long time, Mac security threats weren’t a top of mind concern for security teams and vendors, who primarily focused on securing Windows where they had a much larger footprint. Now, ...
Resource Smart YARA Scans: Saving CPU and Time with osquery
As attackers continually evolve their tactics, the arsenal of tools at hand for defenders needs to respond to attacker complexity while still enabling day-to-day business to happen. When it comes to detecting ...

How To Use MITRE ATT&CK For Endpoint Security
MITRE ATT&CK is a trusted tool in the arsenal of many security teams. When it comes to endpoint security, analysts need to stay proactive to ensure their organization remains resolute in the ...

Osquery vs. OSSEC: Which Is Best for Linux Security in 2020?
For security analysts working on Linux, the lack of flexible, transparent and comprehensive tools is an ongoing problem. As is often the case, security professionals are turning to open-source solutions that can ...

Security Analytics and Big Data: 4 Keys To An Effective Approach
Proper security analytics require big data—a fact that companies are increasingly starting to recognize. Nearly 30% of organizations claim they are collecting, processing, and analyzing significantly more security data than they did ...

Exploring The Critical Components Of DevOps
In a world where development is conducted on a variety of operating systems and hosted on the cloud, having a well-structured development system with integrated security is vital to ensuring that customer ...
Introducing usql: An Interactive Command Line Tool for osquery and Uptycs
If you like a command line and want a way to access osquery data stored in your various Uptycs databases (global | realtime | timemachine), you'll want to install and use usql ...

How To Maximize Your SIEM Benefits
Having the ability to aggregate and analyze data across multiple systems is a necessity for companies of all sizes, primarily for security and compliance reasons. For most businesses, SIEM (security information and ...
Investigating Threat Alerts with Osquery: Understanding Threat Surface & Risk
The Uptycs Threat Intelligence team is responsible for providing a high quality, curated, and current Threat Intelligence feed to the Uptycs product. In order to deliver the threat feed, the team evaluates ...

Conducting A Vulnerability Assessment: A Step-By-Step Guide For Linux Workloads In The Cloud
Being proactive about protecting your systems, networks, applications and critical data is a cornerstone of a robust, successful security program. Having a vulnerability assessment plan is a way of doing just that—proactively ...