Cybersecurity
What is a Proxy Server? How They Work + Security Risks
A proxy server is an intermediary server that retrieves data from an Internet source on behalf of a user. Learn more about how they work and their uses.
Read more
What are Web Shell Attacks? How to Protect Your Web Servers
Web shell attacks have doubled between 2021 and 2020. Learn about this threat and how to protect your web server.
Read more
5 Step Guide: How to Perform a Cyber Risk Analysis
No organization is impervious to cyberattacks. But what separates resilient businesses from data breach victims is superior risk management.
Read more
What is SAML? A Clear Definition + How it Works
SAML (Security Assertion Markup Language) is an open standard that enables users to safely access multiple online services using one login. Learn more.
Read more
What is a Botnet? You Might Be Infected Right Now
Your computer could be used to launch cyberattacks and you'll never realize it. Learn what botnets are and how to identify if you've been recruited.
Read more
Announcement Summary: UpGuard Summit August 2021
During UpGuard Summit on August 18, 2021, some exciting announcements about new and upcoming features. Read about them in this post.
Read more
What is Third-Party Risk?
Third-party risk is any risk brought on to an organization by external parties in its ecosystem or supply chain. Learn more about its importance.
Read more
What is SIEM?
SIEM delivers next-generation cybersecurity functionality for businesses in real-time, covering the key challenges of modern cybersecurity. Learn more.
Read more
What is the Digital Supply Chain?
The digital supply chain uses a network approach to apply digital technologies throughout the supply chain, allowing better integration. Learn more.
Read more
How to Use Nmap
Nmap, short for Network Mapper, is a multi-purpose tool commonly used for penetration testing. Learn what it is and how to use it.
Read more
What is PGP Encryption? How it Works and Why It's Still Reliable.
PGP encryption is still on of the most secure encryption methods available today. Learn how it works and how you can implement it.
Read more
What is Doxing? How to Protect Yourself from Internet Humiliation
Learn what doxing is and how you can protect yourself from being humiliated on the internet.
Read more
What is HTTPS? How it Works and Why It's So Important
HTTPS (Hypertext Transfer Protocol Secure) allows users to safely send information via the Web through encryption. Learn more about its uses and benefits.
Read more
What is Wireshark? The Free Network Sniffing Tool
If you're looking for a free network analysis tool to troubleshoot errors and discover potential cybercriminal activity, Wireshark may be the best fit.
Read more
What is UPnP? Yes, It's Still Dangerous in 2024
If UPnP is currently enabled on your router, you could be at risk of a swathe of cyberattacks. Find out what UPnP is and how to best protect yourself.
Read more
What is Data Classification?
This is a complete overview of data classification. Learn why data classification is required for many regulations and how to implement it in this post.
Read more
Sign up for our newsletter
Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score
How secure is your organization?
Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
- Instant insights you can act on immediately
- Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Book a free demo
Book a free, personalized onboarding call with one of our cybersecurity experts.