SECURITY
XAM
The file table: osquery's secret weapon
In this article, we’ll take a deep dive into osquery tables, by talking about osquery’s ‘file table’ which has some powerful abilities, along with its fair share of limitations.
Continue readingIn this article, we’ll take a deep dive into osquery tables, by talking about osquery’s ‘file table’ which has some powerful abilities, along with its fair share of limitations.
Continue readingSpend less time collating security reports and investigating security issues by creating integrated, customizable dashboards with data from 1Password. The new Rapid7, Blumira, and Stellar Cyber integrations for 1Password allow you to monitor potential risks around company data or credentials stored within 1Password.
Continue readingToday’s social platforms are “public by default”, from Instagram and LinkedIn to Venmo and Strava.
Continue readingManaging developer secrets in a simple and secure way is crucial. It makes your developers more efficient, prevents data breaches, and ensures everyone adheres to your organization’s policies.
Continue readingFor companies looking to get SOC 1 or 2 compliant, it can be hard to find out where to start, so we’re providing a straightforward guide to the ins and outs of SOC audits.
Continue readingWe’re trying to answer all the privacy questions employees might have around their company’s ability to view messages and data within Slack.
Continue reading