Attack Surface Management
What is DMARC?
Domain-based Message Authentication, Reporting & Conformance is an email authentication protocol designed to protect your organization from email spoofing.
Read more
Why is Cybersecurity Important?
If your business isn't concerned about cybersecurity, it's only a matter of time before you're an attack victim. Learn why cybersecurity is important.
Read more
What is Protected Health Information (PHI)?
Protected health information (PHI) is any information about health status, provision of health care or payment for health care that is created or collected
Read more
What is Operations Security (OPSEC)?
Operations security (OPSEC) identifies friendly actions that could be useful for a potential attacker if properly analyzed.
Read more
What is an SMB Port? A Detailed Description of Ports 445 + 139
An SMB port is a network port commonly used for file sharing that is susceptible to an exploit known as EternalBlue exploit that resulted in WannaCry.
Read more
What is an Open Port? Definition & Free Checking Tools
This is a complete overview of open ports. Learn why open ports can be dangerous and how to detect them in this in-depth post.
Read more
What is a Brute Force Attack?
Brute force attacks are a common and costly form of cyberattack that can be prevented. Learn about brute force attacks and how to prevent them in this post
Read more
Cybersecurity Risk Assessment Platforms Explained
Discover leading cybersecurity risk assessment tools that help organizations identify vulnerabilities, manage threats, and enhance their security posture.
Read more
What Is Email Security? Best Practices for 2026
This is a complete overview of email security. Learn about email security best practices and how to implement them with this in-depth post.
Read more
Top 10 Ways To Harden Nginx For Windows
Learn how the top 10 ways to harden your Nginx web server on any Microsoft Windows system.
Read more
How to Secure Your PostgreSQL Database - 10 Tips
These 10 basic security measures will help bolster your PostgreSQL installation against cyber attacks.
Read more
Insider Threats in Cyber Security: How to Detect & Prevent
Learn how to detect and mitigate insider threats, one of the most complex attack vectors to manage in a cybersecurity program.
Read more
Website Security Checklist: Protect Your Website in 2026
Before putting your website into production, be sure to complete the 13 steps in this checklist to protect against the most common hacks and exploits.
Read more
How to Fix the Top 11 OS X Vulnerabilities
Like all operating systems, OS X is highly exploitable if security flaws are left unremediated.
Read more
Kali Linux vs Backbox: Pen Testing and Ethical Hacking Linux Distros
Learn more about these two Linux distros designed for assessing your infrastructure's resilience against cyber attacks.
Read more
How to Secure Your Nginx Deployment: 10 Tips
Nginx is lightweight, fast, powerful—but like all server software, is prone to security flaws that could lead to data breaches.
Read more
Sign up for our newsletter
UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.
Free instant security score
How secure is your organization?
Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
- Instant insights you can act on immediately
- Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
