Cybersecurity

Articles, news, and research on cybersecurity.

Cybersecurity

Cybersecurity

What is Secure Coding?

Secure coding is a method of writing software and source code that's shielded from cyber-attacks.
Read more
Cybersecurity

What is Clickjacking? The Best Attack Prevention Methods

In a Clickjakcing attack, you may be clicking on a malicious link without realizing it. We teach you how to defend yourself against this threat.
Read more
Cybersecurity

Is DDoSing Illegal?

A DDoS attack can be devasting to your online business. Read this post to learn how to defend yourself against this powerful threat.
Read more
Cybersecurity

What is SPF Filtering and How Do I Implement It?

Are you certain cybercriminals are not sending emails with your domain? Learn about SPF filtering and how to implement it.
Read more
Cybersecurity

What is Egregor Ransomware? One of the Worst Threats of 2020

Egregor ransomware is a new threat but in only a few short months it has crippled businesses globally. Learn how to defend against this threat.
Read more
Cybersecurity

What is Netwalker Ransomware? Attack Methods & Protection Tips

Netwalker ransomware attacks are quickly spreading across the globe. Learn how this threat operates and how to successfully defend yourself.
Read more
Cybersecurity

What is Ransomware as a Service (RaaS)? The Dangerous Threat to World Security

The ransomware as a service model has spike the spread of ransomware globally. Learn what this threat is and how you best defend yourself.
Read more
Cybersecurity

What is DLL Hijacking? The Dangerous Windows Exploit

DLL hijacking is possible because of an insecure WIndows process for searching and loading DLL files. Learn how to strengthen this vulnerability.
Read more
Compliance and Regulations
Cybersecurity

10-Step Checklist: GDPR Compliance Guide

GDPR compliance is mandatory but few organizations know how to align with its tenants. In this post, we break down the framework in 10 steps.
Read more
Attack Surface Management
Cybersecurity
Data Breaches

Zero Trust as a Defence Against Supply Chain Attacks

A Zero Trust Architecture is one of the most effective defenses against Supply Chain attacks. Learn how to implement this framework in 7 steps.
Read more
Data Breaches
Cybersecurity

Assume Breach Mentality vs. Supply Chain Attacks in 2024

Supply chain attacks could be prevented if all network activity is assumed to be malicious. Learn how to implement an Assume Breach framework.
Read more
Attack Surface Management
Data Breaches
Cybersecurity
Third-Party Risk Management

Honeytokens as a Defense Against Supply Chain Attacks

Supply chain attacks are on the rise but their attempts could be detected with Honeytokens. Learn how to implement them into your cybersecurity.
Read more
Cybersecurity

What is Digital Risk Protection (DRP)? Why it's Critical In 2024

It's impossible to expand your ecosystem without increasing digital risks. We teach you how to design a resilient digital risk protection framework.
Read more
Cybersecurity

Digital Risk Protection Service (DRPS): Definition + Top Features

With the right Digital Risk Protection Service (DRPS) it's possible to mitigate digital risk while expanding your digital landscape.
Read more
Cybersecurity

What is Digital Risk? Definition and Protection Tactics

Every organization is. exposed to digital risks. Learn about the different types of risks and how you can best protect your ecosystem.
Read more
Cybersecurity

Urgent: 5 CVEs Being Exploited Right Now by SVR

The SolarWinds attackers have finally been named and they're currently targeting 5 vulnerabilities. Learn what they are and how you can protect yourself.
Read more
Deliver icon

Sign up for our newsletter

Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating

Book a free demo

Book a free, personalized onboarding call with one of our cybersecurity experts.