UpGuard Blog

Data Crunch: Stats or Scoreboards?

When it comes to measuring success for your team, finding a reliable and accurate means for doing so can be more difficult than it might appear. UpGuard's VP of Product, Greg Pollock, wrote about his insights into instituting such metrics and understanding the difference between "behavior" and "results."

Read More

Topics: IT operations, process

Cyber Resilience Challenge: Coke vs Pepsi

 

Few corporate rivalries are as legendary as these two enterprise contenders; admittedly, there have been more than a fair share of comparisons pitting the pair against each other over the last century. So we're offering a twist to the traditional cola challenge: how do Pepsi and Coke stack up in terms of cyber resilience? Read more to find out. 

Read More

Topics: security, CSTAR, cybersecurity

US Air Force Suffers Massive Data Breach

Leading security researchers have confirmed that the U.S. Air Force (USAF) suffered a massive data breach leading to the exposure of sensitive military data and senior staff information. Here's what you need to know about this latest security failure involving the U.S. government.

Read More

Topics: cyber risk, data breach

What You Need to Know About the Cloudbleed Bug

On February 18th, 2017, Google security researchers discovered a massive leak in Cloudflare's services that resulted in the exposure of sensitive data belonging to thousands of its customers. Here's what you need to know about the Cloudbleed bug and what can be done to protect your data.

Read More

Topics: cyber risk, vulnerabilities

Windows AD RSoP and GPO Scanning Now Available in UpGuard

Managing complexity in heterogeneous infrastructures is a challenge faced by all enterprise IT departments, even if their environments are relegated to *NIX or Windows. In the case of the latter, UpGuard's new RSoP/GPO scanning capability streamlines remediation and compliance efforts by enabling Windows operators to easily scan and monitor the disparate security configurations of their Active Directory (AD) instances.

Read More

Topics: Microsoft, Windows, active directory, IT management

Cyber Resilience Showdown: AT&T vs Verizon

As the two leading mobile telecom providers in the U.S., AT&T and Verizon are perpetually at war on almost all fronts—pricing, quality of service, network coverage, and more. But with data breaches at an all time high, security fitness may soon become a critical factor for consumers evaluating wireless service providers. Let's find out how the two compare when it comes to measures of enterprise cyber resilience.

Read More

Topics: CSTAR, cybersecurity

Which Fast Food Chain is Next in Line to Get Hacked?

Arby's announced last week that its recently disclosed data breach may impact 355,000 credit card holders that dined at its restaurants between October 2016 and January 2017. Are fast food vendors resilient enough to sustain future cyber attacks and—more importantly—protect consumers against online threats?

Read More

Topics: CSTAR, cyber risk

This Thing We Call DevOps — A Valentine's Day Love Story

The love story between Development and Operations has thus far been filled with high drama, a relationship nurtured out of adversity versus love at first sight. Implementation tears have been shed, lessons have been learned along the way, but where is this romance going—and what lies ahead for the couple in 2017 and beyond?

Read More

Topics: IT automation, devops, IT operations

How Cyber Resilient Are The Top Online Banks?

Booksellers and electronics retailers aren't the only brick-and-mortar businesses challenged by the rise of highly agile, online-only competitors—traditional retail banking institutions also face stiff competition from Internet-based consumer banking upstarts. But are these born-in-the-cloud banks and financial services offerings safer than their traditional counterparts? Let's take a look at the leading online banks to see if they're equipped to handle today's cyber threats.

Read More

Topics: security, CSTAR, cyber risk

Are Leading IoT Vendors Putting Customers at Risk?

On October 21st, 2016, DNS provider DYN suffered from the largest DDoS attack in history, leaving much of the Internet inaccessible to Europe and North America. The unprecedented event saw cyber attackers orchestrating swathes of Mirai malware-infected IoT and connected devices to perform DNS lookup requests from tens of millions of IP addresses—impressive, but hardly sophisticated: the malware gained privileged access by using public, default passwords. Are IoT companies doing enough to secure their "things" against nefarious actors?

Read More

Topics: security, CSTAR, cyber risk

UpGuard Customers