Cybersecurity
What is Egregor Ransomware? One of the Worst Threats of 2020
Egregor ransomware is a new threat but in only a few short months it has crippled businesses globally. Learn how to defend against this threat.
Read more
What is Netwalker Ransomware? Attack Methods & Protection Tips
Netwalker ransomware attacks are quickly spreading across the globe. Learn how this threat operates and how to successfully defend yourself.
Read more
What is Ransomware as a Service (RaaS)? The Dangerous Threat to World Security
The ransomware as a service model has spike the spread of ransomware globally. Learn what this threat is and how you best defend yourself.
Read more
What is DLL Hijacking? The Dangerous Windows Exploit
DLL hijacking is possible because of an insecure WIndows process for searching and loading DLL files. Learn how to strengthen this vulnerability.
Read more
10-Step Checklist: GDPR Compliance Guide
GDPR compliance is mandatory but few organizations know how to align with its tenants. In this post, we break down the framework in 10 steps.
Read more
Zero Trust as a Defence Against Supply Chain Attacks
A Zero Trust Architecture is one of the most effective defenses against Supply Chain attacks. Learn how to implement this framework in 7 steps.
Read more
Assume Breach Mentality vs. Supply Chain Attacks in 2024
Supply chain attacks could be prevented if all network activity is assumed to be malicious. Learn how to implement an Assume Breach framework.
Read more
Honeytokens as a Defense Against Supply Chain Attacks
Supply chain attacks are on the rise but their attempts could be detected with Honeytokens. Learn how to implement them into your cybersecurity.
Read more
What is Digital Risk Protection (DRP)? Why it's Critical In 2024
It's impossible to expand your ecosystem without increasing digital risks. We teach you how to design a resilient digital risk protection framework.
Read more
Digital Risk Protection Service (DRPS): Definition + Top Features
With the right Digital Risk Protection Service (DRPS) it's possible to mitigate digital risk while expanding your digital landscape.
Read more
What is Digital Risk? Definition and Protection Tactics
Every organization is. exposed to digital risks. Learn about the different types of risks and how you can best protect your ecosystem.
Read more
Urgent: 5 CVEs Being Exploited Right Now by SVR
The SolarWinds attackers have finally been named and they're currently targeting 5 vulnerabilities. Learn what they are and how you can protect yourself.
Read more
What is Threat Modelling? 10 Threat Identity Methods Explained
If you can predict the threats that will test your security resilience you can improve your cybersecurity. Learn how.
Read more
What is FIPS 140-3? The Critical Updates You Must Be Aware Of
Learn about the key differences between FIPS 140-3 and FIPS 140-2 and how you can get validated in 2021.
Read more
How to be Compliant with Biden's Cybersecurity Executive Order in 2024
The United States President has signed a Cybersecurity Executive Order that calls for a complete reformation of cybersecurity standards.
Read more
What is a DDoS Attack? How they Work + Protection Strategies
Any web server can be crippled in a DDoS attack. Learn about this devastating cyberattack and how to defend yourself.
Read more
Sign up for our newsletter
Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score
How secure is your organization?
Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
- Instant insights you can act on immediately
- Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Book a free demo
Book a free, personalized onboarding call with one of our cybersecurity experts.