Cybersecurity

Articles, news, and research on cybersecurity.

Cybersecurity

Attack Surface Management
Cybersecurity
Data Breaches

Don’t Use Production Data In Your Test Environment: The Impact Of Leaked Test Credentials

Read about why your third-party vendors and test environments should not contain production data, and how to protect your customers by taking a few steps.
Read more
Compliance and Regulations
Cybersecurity

APRA CPS 234: Information Security Prudential Standard

The APRA CPS 234 prudential standard aims to ensure that regulated Australian entities can protect themselves from cybercrime and security incidents.
Read more
Cybersecurity
Attack Surface Management

What is HSTS (HTTP Strict Transport Security)?

This is a complete overview of the HTTP Strict Transport Security. Learn about what HSTS is and why it is important in this in-depth post.
Read more
Cybersecurity

SolarWinds vs SCOM

How does the leading network monitoring suite compare to Microsoft's data center monitoring solution? Read more to find out.
Read more
Cybersecurity

Tripwire vs AIDE

How does Tripwire compare to the free, open-source AIDE? Read more to find out which solution wins this intrusion detection showdown.
Read more
Cybersecurity

Core Security vs Rapid7 for Continuous Security

Find out how these two penetration testing heavyweights stack up in this continuous security comparison.
Read more
Cybersecurity
Attack Surface Management

Carbon Black vs CrowdStrike

How does Carbon Black's endpoint security platform match up against CrowdStrike's SaaS-based solution for endpoint protection? Read more to find out.
Read more
Cybersecurity

Cavirin vs RiskRecon

Which one of these cybersecurity platforms is better for measuring enterprise cyber risk? Read more to find out.
Read more
Attack Surface Management
Cybersecurity

DNSSEC: What Is It and Why Is It Important?

The DNSSEC is a set of IETF specifications for securing certain kinds of information provided by the DNS as used on Internet Protocol (IP) networks.
Read more
Cybersecurity
Attack Surface Management
Data Breaches

What is an Incident Response Plan?

An incident response plan is a set of written instructions that outline your organization's response to data breaches, data leaks, and cyber attacks.
Read more
Attack Surface Management
Cybersecurity
Third-Party Risk Management

What are Security Ratings? Cybersecurity Risk Scoring Explained

This is a complete guide to security ratings and common use cases. Learn why security and risk management teams have adopted security ratings in this post.
Read more
Attack Surface Management
Cybersecurity

Top 10 Red Hat Enterprise Linux 5 Security Checks

Learn more about these 10 critical security checks for hardening your RHEL 5 servers against cyber attacks.
Read more
Attack Surface Management
Cybersecurity

How to Improve MySQL Security: Top 11 Ways

Learn more about these 11 ways to harden the world's most popular open source database against cyber attackers.
Read more
Cybersecurity
Attack Surface Management

What is Spear Phishing?

Spear phishing is an email spoofing and phishing attack targeting a specific organization or individual.
Read more
Cybersecurity

How to Measure Cyber Risk

Every cyber risk management solution measures risk differently. But which method is most effective to prevent breaches down the road, and why?
Read more
Cybersecurity

What is Cybersecurity Risk Management? Preventing Cyber Attacks

This is a complete overview of cybersecurity risk management. Learn about the 15 top considerations for cybersecurity risk management in this in post.
Read more
Deliver icon

Sign up for our newsletter

Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating

Book a free demo

Book a free, personalized onboarding call with one of our cybersecurity experts.