Cybersecurity

Articles, news, and research on cybersecurity.

Cybersecurity

Cybersecurity

The Biggest Security Risks in Your Supply Chain in 2024

Learn about the biggest security risks in your supply and how to successfully mitigate their impact.
Read more
Cybersecurity

How to Create a Business Continuity Plan

Learn more about the importance of cybersecurity as a part of a business continuity plan.
Read more
Cybersecurity

Reverse Proxy Vs. Load Balancer

Reverse proxies and load balancers have some features in common but aren't quite the same thing. Learn more.
Read more
Cybersecurity

What is Cloud Infrastructure Entitlement Management (CIEM)?

Cloud Infrastructure Entitlements Management (CIEM) is used to manage identities and cloud permissions through the principle of least privilege.
Read more
Cybersecurity

Australia and the Risk of a Russian Cyber Attack: Are You Ready?

Developing tensions between Russia and Ukraine is increasing Australia's risk of a nation-state cyberattack. Learn how to protect your business.
Read more
Cybersecurity

Top 8 Healthcare Cybersecurity Regulations and Frameworks

Learn the top cybersecurity regulations and frameworks for US healthcare organizations developing their information security policies.
Read more
Cybersecurity

What is Cyber Threat Intelligence? Fighting Cyber Crime with Data

A cyber threat intelligence strategy encourages you to think like a cybercriminal, helping you predict and intercept their next moves.
Read more
Cybersecurity

Data Breach vs. Data Leak: What's the Difference?

Learn the differences between data leaks and data breaches and how to apply this understanding to your cybersecurity program in 2022
Read more
Cybersecurity

What is Kerberos Authentication? A Complete Overview

Kerberos is a network authentication protocol that secures user access to services/applications through secret-key cryptography. Learn how it works.
Read more
Cybersecurity

What are the Biggest Cyber Threats in Healthcare?

Read more for a list of the biggest cyber threats impacting the healthcare industry.
Read more
Cybersecurity

CIFS vs. SMB: What's the Difference?

The key difference between CIFS and SMB is that CIFS is a dialect of SMB – a particular implementation of the SMB protocol. Learn more.
Read more
Cybersecurity

What is CIFS?

CIFS (Common Internet File System) is a network protocol that allows clients to communicate with servers and access file sharing and print services.
Read more
Cybersecurity
Third-Party Risk Management

9 Third-Party Risk Cyber Gaps in 2024

Understanding your existing third-party cybersecurity gaps allows you to better manage third-party risk. Learn more in this guide.
Read more
Cybersecurity

What is a Reverse Proxy Server? Learn How they Protect You

Learn about reverse proxies and how they could support your cybersecurity objectives.
Read more
Cybersecurity

What are the Main Differences Between Proxy Servers & VPNs?

Learn the differences between VPNs and Proxy Servers to help you make the right cybersecurity decisions for your requirements.
Read more
Cybersecurity

Common Cloud Misconfigurations and How to Avoid Them

Cloud misconfiguration refers to any glitches, gaps, or errors that could expose your environment to risk during cloud adoption. Learn how to prevent them.
Read more
Deliver icon

Sign up for our newsletter

Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating

Book a free demo

Book a free, personalized onboarding call with one of our cybersecurity experts.