EclecticIQinEclecticIQ BlogEnabling File Integrity Monitoring on Windows with Osquery and EclecticIQ Endpoint ResponseMar 20, 2023Mar 20, 2023
EclecticIQinEclecticIQ BlogIf Infosec Was a Supermarket BusinessThe historical approach for improving this understanding has been too technical for non-technical staff, a new approach is required.Feb 28, 2023Feb 28, 2023
EclecticIQinEclecticIQ BlogWhy MSSPs Must Go Beyond Pure Efficiency to Deliver Value in CybersecurityFeb 7, 2023Feb 7, 2023
EclecticIQinEclecticIQ BlogCompliance Does Not Equal CybersecurityBy constantly chasing compliance, you end up spending too much time on controls that may already be out of date.Jan 5, 2023Jan 5, 2023
EclecticIQinEclecticIQ BlogData Philosophy and Technology Combine for Better Endpoint SecurityDec 29, 2022Dec 29, 2022
EclecticIQComparing Sysmon and EclecticIQ Endpoint Response — Event FiltersComparing Sysmon and EclecticIQ Endpoint Response — Event FiltersDec 28, 2022Dec 28, 2022
EclecticIQinEclecticIQ BlogHunting Emotet Made Easy with EclecticIQ Endpoint ResponseMalware like Emotet is difficult to hunt for merely based on its indicators as they change their characteristics based on the environmentDec 13, 2022Dec 13, 2022
EclecticIQinEclecticIQ BlogUsing Log Parsing to Stop Microsoft IIS Backdoor AttacksNov 23, 2022Nov 23, 2022
EclecticIQQAnon Conspiracies Show Organic Growth Capability with Multi-layered Digital InfrastructureQAnon infrastructure and Modus Operandi drive a horizontally controlled, organically self-sustaining user community. While the group…Dec 22, 2020Dec 22, 2020
EclecticIQTen Years Later, EclecticIQ Examines Evolution of Stuxnet-like AttacksStuxnet malware was reportedly a US-Israel joint enterprise against a critical infrastructure target. The main payload was allegedly…Nov 9, 2020Nov 9, 2020