New Device Inventory: NPM Packages
We are excited to introduce a new Device Property to Kolide’s data collection capabilities, NPM Packages.You can read more about our NPM Packages support in our new Inventory docsWhat is NPM?For the...
View ArticleNew Device Inventory: TPM Chips
We are excited to introduce a new Device Property to Kolide’s data collection capabilities, TPM Chips.You can read more about our TPM support in our new Inventory docs. What is a TPM?A TPM (or Trusted...
View ArticleSummer Tapas: Inventory, Privacy Center, and API Improvements
Happy summer to everyone in the Northern Hemisphere! With vacation plans in full swing, you may have missed several improvements we’ve shipped to the app this week. Let me get you up to speed!A New...
View ArticleThe Evolution of macOS Gatekeeper
The history of Mac endpoint security is like the history of Apple itself: a sprawling tale full of elegant innovations and memorable missteps. That story is too big for a single blog article (or even a...
View ArticleThe Business Guide to ISO 27001 Compliance and Certification
If you’re trying to prove that your organization is serious about security, ISO 27001 is the gold standard, the Black Card, the bumper sticker bragging that you’ve run a full marathon.ISO 27001...
View ArticleYour Software Startup Needs an ICP
When you join a startup as the first (and maybe the only) sales hire, your instinct will be to start closing deals as quickly as possible. Your eyes turn to dollar signs and you start sprinting after...
View ArticleApple's Passkeys Are a Big Step to a Passwordless Future
At WWDC21, Apple announced an ambitious plan to do away with passwords once and for all, replacing them with secure-by-design credentials called passkeys. The feature preview started by making the...
View ArticleIntroducing Deeper Integration With Your SSO Provider
Kolide has long allowed you to control authentication via SSO - it’s even included at no extra cost! Today, we’re announcing a deeper integration with your SSO provider, which opens up some exciting...
View ArticleBuying Kolide vs Building Your Own Osquery Solution
When you’re making the case for your company to buy Kolide, executives and technical procurement managers will inevitably ask if you’ve considered alternatives. And since Kolide uses open-source...
View ArticleThe Twitter Whistleblower Story Is Worse Than You Think
When Twitter’s former head of security, Peter “Mudge” Zatko, blew the whistle on his ex-employers, it sparked a journalistic feeding frenzy. And, as tends to happen, those journalists tried to distill...
View ArticleExplaining the Backlash to the SSO Tax
“The SSO tax” is the unofficial name for the practice of software vendors significantly upcharging their customers for Single Sign-On, usually by making it part of an “enterprise tier.”Opponents of...
View ArticleEmployee Data Privacy: Legal Obligations and Best Practices
In the security world, we talk a lot about what companies should expect from their employees: how to ensure they’re complying with your password policies, working only on approved applications, and...
View ArticleThe Security and IT Admin's Guide to macOS Ventura
The release of macOS Ventura is generating plenty of excitement–Apple’s marketing juggernaut has done a great job of convincing users that they need to install Ventura immediately. Not that Apple has...
View ArticleFinally. You Can Write Your Own Checks!
Checks have been a part of Kolide since our product’s debut in 2019. They are the building blocks that allow you to determine if a device you manage is in a trusted state. Not only that, they allow you...
View ArticleTop 11 Cybersecurity Podcasts We're Listening To
We are lucky enough to be living through the golden age of podcasts. Whatever subject you’re into, you can bet there’s someone out there talking into a microphone about it, and cybersecurity is no...
View ArticleChecks: Keep Firefox up-to-Date, Ventura Support, and Better Stats!
Continuing our recent string of exciting updates to Checks system in Kolide (like our new Custom Check editor), we are pleased to announce a number of new Checks and improvements.New Check: Require...
View ArticleThe Employee's Guide to Slack's Privacy Policy
So here’s the headline: Your boss can read your Slack DMs. Even if you edit them. Even if you delete them. Even if you leave the company.But even if you’re already dimly aware of that fact, you...
View ArticleGitHub Copilot Isn't Worth the Risk
On November 3rd programmer and lawyer Matthew Butterick, along with the Joseph Saveri Law Firm, filed a class action lawsuit against GitHub, Microsoft (its parent company), and OpenAI.The lawsuit,...
View ArticleThe 10 Minute Guide to SOC 1 vs SOC 2
Chances are, if you clicked on this blog, a couple of things recently happened to you:Your boss told you that your company needs to become SOC 1 and/or 2 compliantYou googled “what are SOC audits?”You...
View ArticleCPRA Will Transform How Your Company Treats Employee Data
If you’re reading this after New Years, the revolution has already happened. You can be forgiven for asking “what revolution?” since this one took place with relatively little fanfare. So let us catch...
View Article