Cybersecurity

Articles, news, and research on cybersecurity.

Cybersecurity

Cybersecurity

What is a Software Bill of Materials (SBOM)?

Learn about what a software bill of materials (SBOM) is and how it can help companies understand the software they use.
Read more
Cybersecurity

Guarding Governance: Cybersecurity in the Public Sector

The public sector is one of many critical infrastructures—meaning cybersecurity is crucial. Learn about the latest trends and best practices in this blog.
Read more
Cybersecurity

Securing Your Supply Chain: Risk Management vs Security Management

Explore the difference between supply chain risk management and supply chain security management, along with best practices to secure your supply chain.
Read more
Cybersecurity

What are ESG Frameworks? Corporate Sustainability & ESG Risks

Learn more about ESG and discover common ESG frameworks your organization can follow to mitigate sustainability risk and improve ESG performance.
Read more
Cybersecurity

What is IAM (Identity and Access Management)?

Learn more about Identity and Access Management (IAM) and how your organization can benefit from refining its network access policies.
Read more
Cybersecurity

Why Invest? Building a Case for Increasing Cybersecurity Budgets

Explore why cybersecurity infrastructure is paramount and how to build a case for an increase in your organization's cybersecurity budget.
Read more
Cybersecurity

Free CIS Controls 7.1 Security Questionnaire Template

Learn about the cybersecurity strategies in CIS Controls 7.1 and utilize a free security questionnaire template for your organization.
Read more
Cybersecurity

Free Physical and Data Center Security Questionnaire Template

Explore best practices for securing physical and data centers, including a free security questionnaire template for your organization or vendors.
Read more
Cybersecurity
Third-Party Risk Management

Introducing UpGuard's New SIG Lite Questionnaire

Streamline your data collection and vendor risk assessments with UpGuard’s SIG Lite risk-mapped questionnaire.
Read more
Cybersecurity

What is Network Segmentation? Virtual & Physical Segmentation

Learn more about network segmentation and the differences between physical and virtual segmentation techniques.
Read more
Cybersecurity

Creating a Cybersecurity Report for Senior Management in 2024

Senior management has a unique set of reporting requirements. Learn what they are and how to create a cybersecurity report optimized for this audience.
Read more
Cybersecurity

Creating a Vendor Risk Summary Cybersecurity Report

Learn the best practices for putting together a vendor risk report that keeps your stakeholders updated about the strength of your VRM efforts.
Read more
Cybersecurity

Choosing the Best Tool for Cybersecurity Audits

Cybersecurity audits are a great resource to enhance your organization's security posture. Explore what to look for in an audit tool in this blog post.
Read more
Cybersecurity

What is a Hard Token? Hardware Security Tokens Vs Soft Tokens

Learn more about hard tokens and discover the differences between hardware security tokens and soft tokens.
Read more
Cybersecurity

How to Create a Cybersecurity Board Report (3 Best Practices)

Learn the three best practices for creating a cybersecurity board report that will satisfy even the most difficult board members
Read more
Cybersecurity

The Future of Cybersecurity: ChatGPT For Risk Management?

Discover how ChatGPT is being utilized for third-party risk management, and learn how the chatbot stacks up against a proven TPRM solution
Read more
Deliver icon

Sign up for our newsletter

Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating

Book a free demo

Book a free, personalized onboarding call with one of our cybersecurity experts.