Open in app

Sign In

Write

Sign In

Uptycs Team
Uptycs Team

10 Followers

Home

About

Published in Uptycs

·Jul 21, 2022

The Principle of Shared Responsibility

Written for Uptycs by Lee Atchison Security is a major concern for most businesses when adopting cloud services. The public consciousness of data breaches, cyber attacks and other security incidents has never been higher. Cloud users are now hyper-aware of the potential security risks posed by cloud adoption. Yet, used…

Uptycs

4 min read

The Principle of Shared Responsibility
The Principle of Shared Responsibility
Uptycs

4 min read


Published in Uptycs

·Jun 13, 2022

Black basta Ransomware Goes Cross-Platform, Now Targets ESXi Systems

Original research by Siddharth Sharma and Nischay Hegde The Uptycs Threat research team recently observed an advancement in the Black basta ransomware, where we saw that the ransomware binaries are now targeting ESXi servers. The Black Basta was first seen this year during the month of April, in which its…

Threat Hunting

3 min read

Black basta Ransomware Goes Cross-Platform, Now Targets ESXi Systems
Black basta Ransomware Goes Cross-Platform, Now Targets ESXi Systems
Threat Hunting

3 min read


Published in Uptycs

·Jun 10, 2022

Identity and Security in the Cloud

Written for Uptycs by Lee Atchison Cloud-based applications and services are becoming explosively popular, and increasingly, applications in the cloud are expected to work together and cooperate to achieve more significant results. Data from one application must be shared with another application for the two applications to succeed. …

Cloud Security

3 min read

Identity and Security in the Cloud
Identity and Security in the Cloud
Cloud Security

3 min read


Published in Uptycs

·Apr 26, 2022

Survival Tactics for the Modern Defender: RSA Edition

Written for Uptycs by Suzy McClure Your long-awaited return to the world of in person networking has finally arrived. It’s time to put on some pants and get a fresh haircut. Brush off your social skills and remember that in person- you don’t have that mute button! Here are a…

Rsa Conference

3 min read

Survival Tactics for the Modern Defender: RSA Edition
Survival Tactics for the Modern Defender: RSA Edition
Rsa Conference

3 min read


Published in Uptycs

·Apr 21, 2022

Don’t Give Special people Special Access

Written for Uptycs by Lee Atchison When building modern applications, an astute observer will quickly see an issue in the development process. How do you give developers and operations engineers access to the application to build, fix, and operate the application, without exposing customer data or violating business processes and…

Uptycs

3 min read

Don’t Give Special people Special Access
Don’t Give Special people Special Access
Uptycs

3 min read


Published in Uptycs

·Mar 16, 2022

What Is the Principle of Least Privilege?

Written by Lee Atchison for Uptycs Maintaining operational security is critical for all modern applications. But with the complex, interconnected nature of modern applications, maintaining operational security is harder than ever. In service-based applications, such as those built using microservice architectures, many components can become compromised. …

Least Privilege

4 min read

What Is the Principle of Least Privilege?
What Is the Principle of Least Privilege?
Least Privilege

4 min read


Published in Uptycs

·Mar 4, 2022

CISA Shields Up: Uptycs How-To Guide

Written by: Tyson Supasatit and Jeremy Colvin The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently released Shields Up guidance outlining best practices in response to heightened cyber risk. The Shields Up guidance helps teams to begin assessing and prioritizing improvements in their cybersecurity posture. In this post, we break…

Cisa

7 min read

CISA Shields Up: Uptycs How-To Guide
CISA Shields Up: Uptycs How-To Guide
Cisa

7 min read


Published in Uptycs

·Jan 14, 2022

Best Intrusion Detection Techniques In Cloud Computing

Written by: Amber Picotte Intrusion detection is the practice of monitoring your network, servers, workstations, and other IT assets for any suspicious activity, malicious actions, or violations of some policy. This practice is an integral component of your company’s infrastructure security. Many people in security management make a mistake with…

Cloud Security

5 min read

Best Intrusion Detection Techniques In Cloud Computing
Best Intrusion Detection Techniques In Cloud Computing
Cloud Security

5 min read


Published in Uptycs

·Jan 14, 2022

You should be using AWS IMDSv2: Here’s why and how to do it

Written by: Seshu Pasam Organizations should transition EC2 instances to use Instance Metadata Service Version 2 (IMDSv2) because IMDSv1 is susceptible to server-side request forgery (SSRF) attacks. Uptycs customers should be cautious about enabling the curl table in osquery. …

Cybersecurity

3 min read

You should be using AWS IMDSv2: Here’s why and how to do it
You should be using AWS IMDSv2: Here’s why and how to do it
Cybersecurity

3 min read


Published in Uptycs

·Jan 14, 2022

SOC 2 Compliance Requirements: Essential Knowledge For Security Audits

Written by: Amber Picotte For many security-conscious businesses looking for a SaaS provider, SOC 2 compliance is a minimal requirement. Unfortunately, many providers aren’t sure how to implement SOC 2 compliance requirements, as they are inherently vague. In this article, we’ll find out what SOC 2 is, and explain the…

Soc 2

6 min read

SOC 2 Compliance Requirements: Essential Knowledge For Security Audits
SOC 2 Compliance Requirements: Essential Knowledge For Security Audits
Soc 2

6 min read

Uptycs Team

Uptycs Team

10 Followers
Following
  • InfoSecSherpa

    InfoSecSherpa

  • Andre Camillo

    Andre Camillo

  • Katlyn Gallo

    Katlyn Gallo

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech