EclecticIQinEclecticIQ BlogEnabling File Integrity Monitoring on Windows with Osquery and EclecticIQ Endpoint Response6 min read·Mar 20, 2023----
EclecticIQinEclecticIQ BlogIf Infosec Was a Supermarket BusinessThe historical approach for improving this understanding has been too technical for non-technical staff, a new approach is required.13 min read·Feb 28, 2023----
EclecticIQinEclecticIQ BlogWhy MSSPs Must Go Beyond Pure Efficiency to Deliver Value in Cybersecurity4 min read·Feb 7, 2023----
EclecticIQinEclecticIQ BlogCompliance Does Not Equal CybersecurityBy constantly chasing compliance, you end up spending too much time on controls that may already be out of date.7 min read·Jan 5, 2023----
EclecticIQinEclecticIQ BlogData Philosophy and Technology Combine for Better Endpoint Security5 min read·Dec 29, 2022----
EclecticIQComparing Sysmon and EclecticIQ Endpoint Response — Event FiltersComparing Sysmon and EclecticIQ Endpoint Response — Event Filters5 min read·Dec 28, 2022----
EclecticIQinEclecticIQ BlogHunting Emotet Made Easy with EclecticIQ Endpoint ResponseMalware like Emotet is difficult to hunt for merely based on its indicators as they change their characteristics based on the environment5 min read·Dec 13, 2022----
EclecticIQinEclecticIQ BlogUsing Log Parsing to Stop Microsoft IIS Backdoor Attacks·7 min read·Nov 23, 2022----
EclecticIQQAnon Conspiracies Show Organic Growth Capability with Multi-layered Digital InfrastructureQAnon infrastructure and Modus Operandi drive a horizontally controlled, organically self-sustaining user community. While the group…·8 min read·Dec 22, 2020----
EclecticIQTen Years Later, EclecticIQ Examines Evolution of Stuxnet-like AttacksStuxnet malware was reportedly a US-Israel joint enterprise against a critical infrastructure target. The main payload was allegedly…·6 min read·Nov 9, 2020----