This piece answers whether the built-in security of macOS is enough to forgo a third-party antivirus solution, and how admins can document that security for a SOC 2 audit.
14 min read
Continue readingThis piece answers whether the built-in security of macOS is enough to forgo a third-party antivirus solution, and how admins can document that security for a SOC 2 audit.
14 min read
Continue readingIn this tutorial, we’ll break down how you can use osquery’s ATC feature to expand osquery’s data collection capabilities.
Continue readingHere we provide an overview of the ISO 27001 audit process, so companies can embark on it with a clear idea of what it entails, and how they stand to benefit.
Continue readingIn this article, we’ll take a deep dive into osquery tables, by talking about osquery’s ‘file table’ which has some powerful abilities, along with its fair share of limitations.
Continue readingSpend less time collating security reports and investigating security issues by creating integrated, customizable dashboards with data from 1Password. The new Rapid7, Blumira, and Stellar Cyber integrations for 1Password allow you to monitor potential risks around company data or credentials stored within 1Password.
Continue readingToday’s social platforms are “public by default”, from Instagram and LinkedIn to Venmo and Strava.
Continue reading