Mac Security Blog Infographic Osquery Background BLOG

[Infographic] macOS Native Security Configurations and osquery

Be it for macOS or my dog eating out of the trash, there is no such thing as a bullet-proof security policy. It’s all about creating a threshold of standards- something to ...

Real-Time Observations in Security Hygiene

The most recent breach is notable in that several missteps occurred. These missteps are good reminders of the importance of security hygiene in a hyperconnected world. Take a moment to review and ...

Detecting Malicious Packages in Repositories like PyPI: Using Osquery for Complete Software Inventory

Many systems make installing 3rd party software incredibly convenient; from packaging systems and well loved Linux distribution tools like Debian Apt to app stores and per-language repositories. Users are also often allowed ...
Security Struggling Threats

Security Struggling to Stay Ahead of More Sophisticated Threats

Will organizations ever reach a point where they feel confident about their security and the ability to defend against threats and breaches? I hope the answer is yes, someday our security systems ...
Security Boulevard
Tennesee Highway Billboarding.jpg

Why We Strongly Advocate Ad Blocking: The Steg Affair

via Dan Goodin - Security Editor at the beloved Ars Technica, comes further proof of why we proselytize Ad Blocking both on the enterprise browser deployments, as well as network devices in ...

How the Federal Shutdown Could Do Long-Term Digital Security Damage

Most people have at least heard of the partial shutdown plaguing the U.S. federal government. Now over three weeks old, the stoppage owes its existence to a conflict over border security funding ...

PIPEDA & MDR: Breaches, Reporting and Advice

Changes to Canada’s privacy law, the Personal Information Protection and Electronic Documents Act (PIPEDA) went into effect November 1st. This regulation extends beyond the Canadian border to those companies doing business with ...
Docker Hub, The Backdoor

Docker Hub, The Backdoor

Dan Goodin, writing at Ars Technica, reported. last week of the backdooring of the Docker Hub by compromised Docker images placed on the site. Apparently, all is well now, as the backdoored ...