End Security Obstructionism With Security Automation Orchestration
At Kolide, we believe that IT folks are honest and genuinely want to help their users. We speak to IT leaders every week, and we can feel their excitement when we discuss tools that hold the promise of...
View ArticleIs Grammarly a Keylogger? What Can You Do About It?
Sometimes when I sit down and try to write, the words don’t flow. The sentences are clumsy, the words bump into each other, and I always have the sneaking suspicion that there is a more straightforward...
View ArticleWhat Is Shadow IT? You Can't Solve It by Blocking It
A computer, to me, is the most remarkable tool we [human beings] have ever come up with, and it’s the equivalent of a bicycle for our minds- Steve JobsWhat is the purpose of a computer? Today, we think...
View ArticleMy Perfect B2B SaaS Sales Deck Is 14 Slides Long
What’s wrong with the following statement?“John Doe has been a B2B buyer for X years, he’s seen hundreds of SaaS presentations, and these are his tips for the perfect sales deck.”. . .The issue lies in...
View ArticleNew: Check If Google Chrome Is up to Date
Over the weekend, Google issued numerous warnings to Chrome users, telling them to update their browser version immediately to protect against CVE-2022-1096, a severe vulnerability with active exploits...
View ArticleIs Your Security Awareness Program a Total Snoozefest?
So you put everyone in a room (or video call) and run through your security policy. You checked the compliance boxes for HIPAA, SOC 2, GDPR, PCI-DSS, or NIST data privacy regulations. You’re all set,...
View ArticleHow to Write a New Osquery Table
IntroductionOne of my favorite features of osquery is the delightful user experience associated with developing new virtual tables. In this guide, we will work together to implement a new high-value...
View ArticleEvergreen Vulnerability Management
Endpoint vulnerability management has always been a valuable yet tough nut to crack. Organizations that successfully implement an effective vulnerability management program benefit in two ways. First,...
View ArticleDo Macs Need Third-Party Antivirus for SOC 2 Compliance?
This article is just about Macs. Want to know our perspective on third-party AV for Windows? Check out, “Is Windows Defender Enough to Pass SOC 2?.” Want to skip the preamble? Go right to the osquery...
View ArticleThe File Table: Osquery's Secret Weapon
This article is part of an ongoing series in which we look at specific osquery tables and discuss what they can and cannot do. In another article: Using Spotlight across your fleet with osquery, we...
View ArticleHow to Build Custom Osquery Tables Using ATC
In this tutorial, we’ll break down how you can use osquery’s ATC feature to expand osquery’s data collection capabilities. As an example, we will look into how to tap into macOS’ quarantine events...
View ArticleNew Inventory: Windows Defender and XProtect Reports
We are excited to announce that we’ve added new Inventory to help provide extensive visibility into the built-in antivirus protection in macOS and Microsoft Windows. These are great for customers...
View ArticleSecurity Effects of WFH Life
When the COVID-19 pandemic hit in 2020, our lives, and our world, changed. As the pandemic raged on, an unprecedented number of organizations moved to remote work, and the way IT functioned...
View ArticleIs Windows Defender Enough to Pass SOC 2?
This article is just about Windows devices. Want to know our perspective on third-party AV for macOS? Check out “Do Macs Need Third-Party Antivirus for SOC 2 Compliance?.” Want to skip the preamble?...
View ArticleBusiness Password Management for Storing and Sharing Credentials
With the average person having 130 different accounts, the fight for password security can feel a bit overwhelming. If your employees follow password management best practices, that means 130 different...
View ArticleOur Startup's SOC 2 Compliance Journey
Hello and welcome to the only guide to SOC 2 compliance for people who never expected themselves to be reading an article on this subject.If you’re reading this, you’re likely in the same position I...
View ArticleWhy There's No Such Thing As MDM for Linux, and What to Do About It
If you want to make Google tongue-tied, search for “MDM for Linux.”What you’ll find are a few vendors who claim to offer device management for Linux devices (usually as an afterthought to round out...
View ArticleHow Much Does a SOC 2 Audit Cost?
The question “How much does SOC 2 certification cost” doesn’t have a single, universal answer. The total costs of an audit–including all the knock-on expenses associated with it–can range from tens to...
View ArticleHow to Run Osqueryi With Kolide Launcher Tables
Kolide Launcher has been a labor of love since the inception of our company. It provides auto-update functionality and vastly extends the core data collection capabilities of the vanilla osquery agent....
View ArticleIntroducing the Check Catalog
Two questions we get a lot are:How do I know when Kolide ships a new Check?Where do I even go inside Kolide to find the Checks that are available to add?Well, I’m excited to share that both of these...
View Article