Cybersecurity

Articles, news, and research on cybersecurity.

Cybersecurity

Cybersecurity

What is LDAP? How it Works, Uses, and Security Risks

Learn what Lightweight Directory Access Protocol (LDAP) is, how it works and how cybercriminals leverage its design to launch cyberattacks
Read more
Cybersecurity

What are Indicators of Attack (IOAs)? How they Differ from IOCs

IOAs, when used in conjunction with IOCs, can significantly increase the efficacy of cybersecurity programs defending against data breaches.
Read more
Cybersecurity

What is Cloud Security Posture Management (CSPM)?

Cloud Security Posture Management (CSPM) is a category of cybersecurity tools that enhance cloud data security. Learn how they secure cloud environments.
Read more
Cybersecurity

Log4Shell: The Log4j Vulnerability Emergency Clearly Explained

A concise overview of the Apache Log4j vulnerability, its implications, and how to secure your sensitive data against its exploitation.
Read more
Cybersecurity

What is an Advanced Persistent Threat (APT)?

Learn what Advanced Persistent Threats are, how to detect them, and how to protect your systems from compromise.
Read more
Cybersecurity

What is Metasploit?

The Metasploit Framework is an open-source framework that is used to find, exploit, and validate system vulnerabilities. Learn more about how it works.
Read more
Cybersecurity

What is an Enumeration Attack? How they Work + Prevention Tips

Enumeration attacks help cybercriminals confirm sensitive records in a web server database. Learn how to prevent this malicious threat.
Read more
Cybersecurity

What is a Security Operations Center (SOC)?

A security operations center (SOC) is a centralized facility that unifies an organization’s security monitoring across all IT infrastructure. Learn more.
Read more
Cybersecurity

What is a CASB (Cloud Access Security Broker)?

A CASB (cloud access security broker) is an intermediary between users, an organization, and a cloud environment. Learn more.
Read more
Cybersecurity

The 6 Biggest Cyber Threats for Financial Services in 2024

Learn about the biggest cyber threats every financial service should be aware of in 2021 and how to successfully defend against them.
Read more
Cybersecurity

What is a Keylogger? Hackers Could Be Stealing Your Passwords

Keyloggers clandestinely monitor everything a user types into their keyboards, including passwords and credit card data. Learn how to detect them.
Read more
Cybersecurity

What is Endpoint Detection and Response (EDR)?

Endpoint detection and response (EDR) is a cybersecurity technology that detects and investigates suspicious web activities and other security incidents.
Read more
Cybersecurity

What is SASE (Secure Access Service Edge)?

SASE (Secure Access Service Edge) is a network architecture that unifies network and security solutions via the cloud to enhance accessibility.
Read more
Cybersecurity

What is an Intrusion Detection System (IDS)? + Best IDS Tools

An intrusion detection system (IDS) is a software application or hardware device that detects cyber attacks. Learn more about how it works and its uses.
Read more
Cybersecurity

What is a Cache?

A cache is a temporary data storage location that stores copies of frequently accessed data or files. Learn more about its types and uses.
Read more
Cybersecurity

Open Source Intelligence (OSINT): Top Tools and Techniques

Open source intelligence (OSINT) is the process of obtaining and analyzing data from publicly available sources.
Read more
Deliver icon

Sign up for our newsletter

Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating

Book a free demo

Book a free, personalized onboarding call with one of our cybersecurity experts.