How osquery helps secure your cloud with these two critical CIS Benchmark controls

Two of the 6 basic security controls, according to the Center for Internet Security, are focused on the current state of your assets. Assessing the state of your assets has been a priority for years, but the old means aren’t as effective in modern infrastructure as they were on legacy ... Read More
Black-hat-escalator

Black Hat USA 2018: Targeted Threat Hunting, Managed Everything, Serverless Security and Other Trends

| | Insider
Quenching your thirst in the desert is a major challenge, but seeing everything at BSides Las Vegas and Black Hat is even more difficult. While I am there every year, hydrating, I try to take note of the innovation I see. Luckily, the Black Hat team has named Innovation City ... Read More

Cloud Workloads: Not the same ol’ endpoints

This may sound like common sense to developers, but securing the assets in your cloud requires you to recognize just how different a cloud workload is from a user asset. While the high level strategy is nothing new, legacy solutions cannot simply be repurposed in your cloud due to some ... Read More
lazy-investor-availability-heuristic

Is your Mac fleet secure? Tackling the myth of inherent mac security

| | mac edr, macos
There’s a dangerous myth among some Mac users that, unlike Windows, the platform is impervious to malware. Since nothing is bulletproof, it would be dangerous to assume Mac fleet security, so let’s recognize why Macs have historically been low risk and why that looks to be changing ... Read More
mayfly

Infrastructure Management Has Evolved – Has Your Continuous Monitoring?

Despite there being hundreds of software solutions focused on monitoring, today’s operations professionals lack the assessment and detection coverage they need in their CI/CD infrastructure. Software applications have reached an inflection point in the pace at which businesses are evolving their operations, and so a new approach is needed for ... Read More