Attack Surface Management
Arachni vs OWASP ZAP
Which of these two leading pen testing suites is more effective at discovering security flaws in software applications? Read more to find out.
Read more
25 Working from Home Security Tips for Staff and Employers in 2024
This is a complete overview of how to stay secure while working from home. Learn what you can do as an employee and employer in this in-depth post.
Read more
What Is a Man-in-the-Middle Attack? Prevention Tips and Guide
A man-in-the-middle attack (MITM attack) is a cyber attack where an attacker relays and possibly alters communication between two parties.
Read more
Tenable vs. McAfee MVM vs. Rapid7
Intel has pulled the plug on McAfee Vulnerability Manager. But will customers move with them to Rapid7 or explore other options like Tenable?
Read more
What is Penetration Testing?
This is a complete overview of penetration testing. Learn about how penetration testing is used to reduce cybersecurity risk with this in-depth post.
Read more
Caught In The AWS Tarpit
While running a series of unit tests that make API calls to Amazon Web Services (AWS), tests were failing unpredictably. All driven by AWS authentication.
Read more
How to Protect Ruby on Rails from Hackers: 7 Ways Infographic
Learn how to fix these 7 Rails vulnerabilities that commonly lead to web application compromises.
Read more
Rapid7 vs Qualys
Which of these two leading vulnerability management solutions is better at detecting and remediating security flaws? Read more to find out.
Read more
Top 20 Critical Windows Server 2008 Vulnerabilities And Remediation Tips
Learn about the top 20 Windows Server 2008 vulnerabilities, exploits, and security flaws that can lead to a data breach and how to fix them.
Read more
What is Attack Surface Management? Definition + ASM Guide
This is a complete overview of attack surface management. Learn how attack surface management can keep your organization secure in this in-depth post.
Read more
Why are Security Ratings Important?
This is a complete overview of why security ratings are important. Learn about how to security ratings can help your organization with this in-depth post.
Read more
What is the WannaCry Ransomware Attack?
WannaCry is a ransomware cryptoworm cyber attack that targets computers running the Microsoft Windows operating system.
Read more
How to Secure Your Nginx Deployment: 10 Tips
Nginx is lightweight, fast, powerful—but like all server software, is prone to security flaws that could lead to data breaches.
Read more
Kali Linux vs Backbox: Pen Testing and Ethical Hacking Linux Distros
Learn more about these two Linux distros designed for assessing your infrastructure's resilience against cyber attacks.
Read more
How to Fix the Top 11 OS X Vulnerabilities
Like all operating systems, OS X is highly exploitable if security flaws are left unremediated.
Read more
Website Security Checklist: Protect Your Website in 2024
Before putting your website into production, be sure to complete the 13 steps in this checklist to protect against the most common hacks and exploits.
Read more
Sign up for our newsletter
Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score
How secure is your organization?
Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
- Instant insights you can act on immediately
- Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities