https://github.com/osquery/osquery logo
Join Slack
Channels
general
android_tests
apple-silicon
arm-architecture
auditing-warroom
awallaby
aws
beyond-identity
carving
code-review
community-feeds
core
darkbytes
doorman
ebpf
eclecticiq-polylogyx-extension
extensions
file-carving
fim
fleet
fleet-dev
fleetosquery
foundation
fuzzing
golang
goquery
help-proxy
infrastructure
jobs
kolide
linen-dev
linux
loonsecio
macos
officehours
osctrl
plugins
process-auditing
qingteng
querycon
queryhub
random
selfgroup
sql
tls
uptycs
vendor-feeds
website
windows
zeek
zentral
zercurity
Powered by
# vendor-feeds
  • u

    user

    05/19/2022, 8:10 PM
    What Is Cyber Threat Hunting? The process of proactively searching through networks and datasets to detect and respond to advanced cyberthreats that evade traditional rule or signature based security controls, Proactive Cyber Threat Hunting uncovers malicious actors that have advanced past initial endpoint security defenses.    Businesses in every industry and governments in every nation are acutely aware...
  • u

    user

    05/26/2022, 10:10 AM
    Keep Pace with DevOps Teams: Adding Kubernetes Telemetry to Security Analytics for End-to-End Container Protection Today, Uptycs is announcing enhanced container and Kubernetes capabilities that make it much simpler to secure containers at scale. These capabilities in Kubernetes security posture management (KSPM), container governance, threat detection, and vulnerability scanning ensure that container-based...
  • u

    user

    05/31/2022, 4:13 PM
    Our Startup's SOC 2 Compliance Journey These days, SOC 2 certification is seen as table stakes for SaaS startups. But it's only worth doing if the ROI will make up for the time and money you spend.
  • u

    user

    05/31/2022, 4:40 PM
    WarzoneRAT Can Now Evade Detection With Process Hollowing Research by: Pritam Salunkhe and Shilpesh Trivedi
  • u

    user

    06/01/2022, 3:20 PM
    Announcing Uptycs RSA Conference Speaker Sessions In this post: In-Booth Lightning Session Schedule Sandbox VR Deep Dive Session Schedule
  • u

    user

    06/06/2022, 10:10 AM
    Uptycs Broadens CNAPP Vision: What's Next For Cloud-Native Application Protection Over the past year, Uptycs has been focused on adding new capabilities to our security analytics platform that meet cloud-native application protection platform (CNAPP) use cases. The time and effort it took us to add these features is arguably less than what other vendors spend acquiring technology and adding it into their portfolios.
  • u

    user

    06/07/2022, 8:30 AM
    Black basta Ransomware Goes Cross-Platform, Now Targets ESXi Systems Original research by Siddharth Sharma and Nischay Hegde The Uptycs Threat research team recently observed an advancement in the Black basta ransomware, where we saw that the ransomware binaries are now targeting...
  • u

    user

    06/08/2022, 7:30 PM
    Uptycs RSA Booth Sessions, Raffles, and Security Strategy Day 3 With two successful days at RSA, the Uptycs team is preparing for a third - with our lightening booth sessions continuing to shed opportunities for innovation and insight into the power of our platform.
  • u

    user

    06/09/2022, 4:10 PM
    Remaining Deep Dive Sessions at SandBox VR Deep Dive Sessions at Sandbox VR Want to dive a little deeper? Our team will be hosting deeper dive sessions at our exclusive Sandbox VR space. To get your invite, stop by Booth 435 to get a wristband and join us for our final session.
  • u

    user

    06/10/2022, 7:03 PM
    Why There's No Such Thing As MDM for Linux, and What to Do About It MDMs are fundamentally incompatible with the technology and culture of Linux, but you still have options for endpoint security.
  • u

    user

    06/14/2022, 5:40 PM
    SD-WAN VS MPLS One of the most typical considerations network security architects and CISOs make when constructing their WAN architecture is whether to use SD-WAN instead of MPLS. As enterprises move from MPLS to support transition to a multicloud environment for predictable user experience and the reduction of bandwidth costs, SD-WAN proves to protect their networks and prepare for a future move to SASE...
  • u

    user

    06/14/2022, 10:20 PM
    Kubernetes Pods VS Nodes What Is A Pod In Kubernetes? A group of one or more application containers (such as Docjer or rkt) a Pod includes shared storage (volumes), IP address and information about how to run them.
  • u

    user

    06/14/2022, 11:00 PM
    Kubernetes Pods VS Nodes What Is A Pod In Kubernetes? A group of one or more application containers (such as Docjer or rkt), a Pod includes shared storage (volumes), IP address and information about how to run them.
  • u

    user

    06/14/2022, 11:40 PM
    Kubernetes Pods VS Nodes What Is A Pod In Kubernetes? A group of one or more application containers (such as Docjer or rkt), a Pod includes shared storage (volumes), IP address and information about how to run them.
  • u

    user

    06/17/2022, 7:33 PM
    How Much Does a SOC 2 Audit Cost? A SOC 2 compliance consultant breaks down all the factors that influence audit costs, and what businesses can do to decrease them.
  • u

    user

    06/24/2022, 8:11 PM
    Introducing the Check Catalog Two questions we get a lot are:
  • u

    user

    06/28/2022, 2:31 PM
    New Device Inventory: NPM Packages Kolide now enabled you to collect and query the installed NPM Packages across Mac, Windows, and Linux devices.
  • u

    user

    06/30/2022, 10:20 PM
    First Impressions And Key Takeaways By A First Time Attendee | RSA 2022 A Content Marketing Specialist with a little over a year in the industry, RSAC 2022 was my first cybersecurity conference, with things I didn’t expect, a few I would do again, and a caliber of conversation, insight, and meaningful relationship I found to define my experience.
  • u

    user

    06/30/2022, 10:40 PM
    First Impressions And Key Takeaways By A First Time Attendee | RSA 2022 As a Content Marketing Specialist with a little over a year in the industry, RSAC 2022 was my first cybersecurity conference, with things I didn’t expect, a few I would do again, and a caliber of conversation, insight, and meaningful relationship I found to define my experience.
  • u

    user

    06/30/2022, 11:20 PM
    First Impressions And Key Takeaways By A First Time Attendee | RSA 2022 As a Content Marketing Specialist with only a little over a year in the industry, RSAC 2022 was my first cybersecurity conference, with things I didn’t expect, a few I would do again, and a caliber of conversation, insight, and meaningful relationship I found to define my experience.
  • u

    user

    07/01/2022, 8:40 PM
    KurayStealer: A Bandit Using Discord Webhooks Research by: Ashwin Vamshi and Shilpesh Trivedi
  • u

    user

    07/06/2022, 2:50 PM
    AWS Re:inforce 2022: Boston Visitors Guide If you’re planning on attending the AWS Re:inforce event in Boston in a few weeks, we’re excited to welcome you to our hometown. That’s right, Uptycs is a part of the thriving tech startup community here in Mass, and our offices are located just west of the city in Waltham (the only town in New England where you actually pronounce the “-ham” part instead of...
  • u

    user

    07/06/2022, 7:03 PM
    New Device Inventory: TPM Chips Kolide now enables you to collect and query information about the TPM chip embedded in your PCs.
  • u

    user

    07/07/2022, 2:43 PM
    Summer Tapas: Inventory, Privacy Center, and API Improvements Kolide now allows end users to reset their device ownership to company-owned and dramatically improved the documentation in Inventory.
  • u

    user

    07/11/2022, 6:07 PM
    What Is Containerization In Devops? Defined by the placement of a software component and its environment, dependencies, and configuration into an isolated unit called a container, containerization makes it possible to deploy an application consistently on any computing environment, whether on-premises or cloud-based.
  • u

    user

    07/11/2022, 6:40 PM
    What Is Containerization In DevOps? Defined by the placement of a software component and its environment, dependencies, and configuration into an isolated unit called a container, containerization makes it possible to deploy an application consistently on any computing environment, whether on-premises or cloud-based.
  • u

    user

    07/14/2022, 10:30 PM
    What Is Detection Engineering? Detection engineering (DE) is a new approach to threat detection. More than just writing detection rules, detection engineering is a process—applying systems thinking and engineering to more accurately detect threats. The goal is to create an automated system of threat detection which is customizable, flexible, repeatable, and produces high quality alerts for security teams to...
  • u

    user

    07/15/2022, 5:53 PM
    The Evolution of macOS Gatekeeper Gatekeeper is at the center of the Mac's anti-malware efforts, and Apple's mission to balance UI and security.
  • m

    Martin Rutkowski

    07/21/2022, 1:55 PM

    https://www.youtube.com/watch?v=uTsKkndgkys▾

  • u

    user

    07/22/2022, 2:43 PM
    The Business Guide to ISO 27001 Compliance and Certification ISO 27001 compliance isn't a "check the box" exercise. While documentation is important, auditors will test to see if your ISMS actually works as promised.
12345Latest