Cybersecurity

Articles, news, and research on cybersecurity.

Cybersecurity

Cybersecurity
Attack Surface Management

What is the WannaCry Ransomware Attack?

WannaCry is a ransomware cryptoworm cyber attack that targets computers running the Microsoft Windows operating system.
Read more
Cybersecurity

What is a Data Leak? Stop Giving Cybercriminals Free Access

Data leaks are an overlooked attack vector that increase your risk of suffering a data breach. Learn what they are and how to shut them down quickly.
Read more
Data Breaches
Third-Party Risk Management
Cybersecurity

Spotify Resets User Passwords to Protect Against Third Party Data Breaches

The LinkedIn data breach compromised hundreds of thousands of passwords, leaving accounts wide open across numerous sites. Spotify took action.
Read more
Attack Surface Management
Cybersecurity

How to Secure Your Nginx Deployment: 10 Tips

Nginx is lightweight, fast, powerful—but like all server software, is prone to security flaws that could lead to data breaches.
Read more
Attack Surface Management
Cybersecurity

Kali Linux vs Backbox: Pen Testing and Ethical Hacking Linux Distros

Learn more about these two Linux distros designed for assessing your infrastructure's resilience against cyber attacks.
Read more
Attack Surface Management
Cybersecurity

How to Fix the Top 11 OS X Vulnerabilities

Like all operating systems, OS X is highly exploitable if security flaws are left unremediated.
Read more
Attack Surface Management
Cybersecurity

Website Security Checklist: Protect Your Website in 2024

Before putting your website into production, be sure to complete the 13 steps in this checklist to protect against the most common hacks and exploits.
Read more
Cybersecurity

What Is Cybersecurity? A Thorough Definition

Cybersecurity is the practice of protecting computer systems, networks, devices, and programs from potential cyber attacks or threats.
Read more
Compliance and Regulations
Cybersecurity

The Most Important Security Metrics to Maintain Compliance

This is a complete overview of security metrics. Learn how to use security metrics to maintain compliance with regulations in this in-depth post.
Read more
Attack Surface Management
Cybersecurity

How to Secure Your PostgreSQL Database - 10 Tips

These 10 basic security measures will help bolster your PostgreSQL installation against cyber attacks.
Read more
Attack Surface Management
Cybersecurity

Top 10 Ways To Harden Nginx For Windows

Learn how the top 10 ways to harden your Nginx web server on any Microsoft Windows system.
Read more
Cybersecurity

Tripwire Enterprise vs Free Tripwire Open Source

Learn about Tripwire Enterprise compares to Tripwire Open Source so you can decide on the best product for your organization.
Read more
Attack Surface Management
Cybersecurity

What Is Email Security? Best Practices for 2024

This is a complete overview of email security. Learn about email security best practices and how to implement them with this in-depth post.
Read more
Cybersecurity
Attack Surface Management

Cybersecurity Risk Assessment Tools You Can Rely on Year-Round

This is a complete guide to cybersecurity risk assessment tools. Learn about how organizations use these tools to keep their sensitive data secure.
Read more
Cybersecurity

What is Information Security?

Information security, sometimes shortened to infosec, is the practice of protecting information from unauthorized access by mitigating information risks.
Read more
Cybersecurity
Attack Surface Management

What is a Brute Force Attack?

Brute force attacks are a common and costly form of cyberattack that can be prevented. Learn about brute force attacks and how to prevent them in this post
Read more
Deliver icon

Sign up for our newsletter

Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating

Book a free demo

Book a free, personalized onboarding call with one of our cybersecurity experts.