Cybersecurity

Articles, news, and research on cybersecurity.

Cybersecurity

Cybersecurity

What is a Computer Worm?

A computer worm is a type of malicious software that self-replicates, infecting other computers while remaining active on infected systems.
Read more
Cybersecurity

What is a Zero-Day (0-Day)?

A zero-day (0-day) is an unpatched security vulnerability that is previously unknown to the software, hardware or firmware producer.
Read more
Cybersecurity
Attack Surface Management

Tenable vs. McAfee MVM vs. Rapid7

Intel has pulled the plug on McAfee Vulnerability Manager. But will customers move with them to Rapid7 or explore other options like Tenable?
Read more
Attack Surface Management
Cybersecurity

What is Penetration Testing?

This is a complete overview of penetration testing. Learn about how penetration testing is used to reduce cybersecurity risk with this in-depth post.
Read more
Cybersecurity

Why Should I Care About Cyber Risk?

Cyber risk is about more than IT; it's about how a company does business. Here are five good reasons why CEOs, CFOs and other business leaders should care.
Read more
Attack Surface Management
Cybersecurity

Caught In The AWS Tarpit

While running a series of unit tests that make API calls to Amazon Web Services (AWS), tests were failing unpredictably. All driven by AWS authentication.
Read more
Cybersecurity

Top 10 Java Vulnerabilities And How To Fix Them

Learn how to fix critical vulnerabilities in these 10 commonly used Java-related tools and technologies.
Read more
Cybersecurity

How to Perform a Cybersecurity Risk Assessment

Ineffective risk assessments increase your risk of data breaches. Follow this step-by-step guide to protect your IT ecosystem from critical vulnerabilities
Read more
Attack Surface Management
Cybersecurity

How to Protect Ruby on Rails from Hackers: 7 Ways Infographic

Learn how to fix these 7 Rails vulnerabilities that commonly lead to web application compromises.
Read more
Cybersecurity

17 Ransomware Examples & How They Occurred

Ransomware, a type of malicious software or malware, is designed to deny access to computer systems or sensitive data until ransom is paid. 
Read more
Attack Surface Management
Cybersecurity

Rapid7 vs Qualys

Which of these two leading vulnerability management solutions is better at detecting and remediating security flaws? Read more to find out.
Read more
Data Breaches
Cybersecurity

116 Must-Know Data Breach Statistics for 2023

116 data breach statistics that cover risk, cost, prevention, industry trends, and more. Assess and analyze these stats and learn to prevent data breaches.
Read more
Attack Surface Management
Cybersecurity

Top 20 Critical Windows Server 2008 Vulnerabilities And Remediation Tips

Learn about the top 20 Windows Server 2008 vulnerabilities, exploits, and security flaws that can lead to a data breach and how to fix them.
Read more
Cybersecurity

How Secure Is Electronic Voting in Today's Digital Landscapes?

Voting day is just a couple months away—how will election voting systems hold up in the presence of politically-motivated cyber attacks?
Read more
Cybersecurity
Attack Surface Management
Third-Party Risk Management

Why are Security Ratings Important?

This is a complete overview of why security ratings are important. Learn about how to security ratings can help your organization with this in-depth post.
Read more
Cybersecurity

How Secure Is Your Cell Phone Provider?

Telecommunications providers handle most of the world's information. But how secure are their websites?
Read more
Deliver icon

Sign up for our newsletter

Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating

Book a free demo

Book a free, personalized onboarding call with one of our cybersecurity experts.