Cybersecurity

Articles, news, and research on cybersecurity.

Cybersecurity

Cybersecurity

What is Social Engineering? Definition + Attack Examples

Social engineering campaigns trick employees into relinquishing private data. Learn how to protect your organization against this slippery threat.
Read more
Cybersecurity

Tripwire vs RedSeal

How does Tripwire's solution for enterprise cyber protection stack up against RedSeal's platform for network resilience? Read more to find out.
Read more
Cybersecurity

Why CEO Approval Ratings Matter for Risk Assessments

Our new digital reputation scan provides a fast and easy way to get a risk assessment for your (or any) business.
Read more
Cybersecurity

Carbon Black vs Symantec Endpoint Protection

Find out how veteran Symantec's Endpoint Protection stacks up against Bit9 + Carbon Black's security solution.
Read more
Cybersecurity

Cybersecurity Vs. Information Security: What's the Difference?

Learn about the key differences between cybersecurity and information security in this in-depth post.
Read more
Cybersecurity

What is Cyber Hygiene and Why is it Important?

This is a complete overview of cyber hygiene. Learn about why cyber hygiene is important and its best practices in this in-depth post.
Read more
Cybersecurity
Attack Surface Management

What is a Network Security Assessment?

This is a complete overview of network security assessments. Learn how to run a network security assessment in this in-depth post.
Read more
Attack Surface Management
Cybersecurity
Data Breaches

Check your Amazon S3 permissions. Someone will.

Companies regularly host sensitive data on Amazon's S3. Sometimes they forget to close it off to the internet. Here's a guide to make sure you don't.
Read more
Compliance and Regulations
Cybersecurity

What is the NYDFS Cybersecurity Regulation? (23 NYCRR 500)

23 NYCRR 500 is a set of regulations from the NYDFS that places cybersecurity requirements on all financial institutions and financial services companies.
Read more
Cybersecurity

AlienVault vs Tenable for Continuous Security

Read more to find out whether AlienVault or Tenable is best for ensuring strong continuous security.
Read more
Cybersecurity
Attack Surface Management

What is Network Security?

Network security is the process of using physical and software security solutions to protect the underlying network infrastructure from unauthorized access
Read more
Cybersecurity

AlienVault vs QRadar

How does IBM's QRadar compare to AlienVault USM for detecting cyber threats? Find out in this comparison.
Read more
Attack Surface Management
Cybersecurity

How to Secure Apache Tomcat 8 in 15 Steps

A practical guide to hardening and securing your Apache Tomcat Server with best practices to ensure your server is more secure than the default.
Read more
Cybersecurity

Tripwire Enterprise vs OSSEC: Fee or Free, Which Is Better?

Find out if the popular open source security solution OSSEC can hold its own against Tripwire Enterprise.
Read more
Cybersecurity
Attack Surface Management

S3 Security Is Flawed By Design

There are two design flaws that cause most S3 data breaches. Read why we AWS should separate S3 into two products that clearly separate private and public.
Read more
Cybersecurity
Attack Surface Management

How to Secure Your Windows Environment: Top 10 Ways

Learn more about the basic elements to bolstering your Windows environment against cyber attackers.
Read more
Deliver icon

Sign up for our newsletter

Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating

Book a free demo

Book a free, personalized onboarding call with one of our cybersecurity experts.