Attack Surface Management

Articles, news, and research on attack surface management.

Attack Surface Management

Attack Surface Management
Cybersecurity

What Is Email Security? Best Practices for 2025

This is a complete overview of email security. Learn about email security best practices and how to implement them with this in-depth post.
Read more
Attack Surface Management
Cybersecurity

Top 10 Ways To Harden Nginx For Windows

Learn how the top 10 ways to harden your Nginx web server on any Microsoft Windows system.
Read more
Attack Surface Management
Cybersecurity

How to Secure Your PostgreSQL Database - 10 Tips

These 10 basic security measures will help bolster your PostgreSQL installation against cyber attacks.
Read more
Attack Surface Management

Insider Threats in Cyber Security: How to Detect & Prevent

Learn how to detect and mitigate insider threats, one of the most complex attack vectors to manage in a cybersecurity program.
Read more
Attack Surface Management
Cybersecurity

Website Security Checklist: Protect Your Website in 2025

Before putting your website into production, be sure to complete the 13 steps in this checklist to protect against the most common hacks and exploits.
Read more
Attack Surface Management
Cybersecurity

How to Fix the Top 11 OS X Vulnerabilities

Like all operating systems, OS X is highly exploitable if security flaws are left unremediated.
Read more
Attack Surface Management
Cybersecurity

Kali Linux vs Backbox: Pen Testing and Ethical Hacking Linux Distros

Learn more about these two Linux distros designed for assessing your infrastructure's resilience against cyber attacks.
Read more
Attack Surface Management
Cybersecurity

How to Secure Your Nginx Deployment: 10 Tips

Nginx is lightweight, fast, powerful—but like all server software, is prone to security flaws that could lead to data breaches.
Read more
Cybersecurity
Attack Surface Management

What is the WannaCry Ransomware Attack?

WannaCry is a ransomware cryptoworm cyber attack that targets computers running the Microsoft Windows operating system.
Read more
Attack Surface Management

What is Attack Surface Management? Tools and Best Practices

This is a complete overview of attack surface management. Learn how attack surface management can keep your organization secure in this in-depth post.
Read more
Attack Surface Management
Cybersecurity

Top 20 Critical Windows Server 2008 Vulnerabilities And Remediation Tips

Learn about the top 20 Windows Server 2008 vulnerabilities, exploits, and security flaws that can lead to a data breach and how to fix them.
Read more
Attack Surface Management
Cybersecurity

Rapid7 vs Qualys

Which of these two leading vulnerability management solutions is better at detecting and remediating security flaws? Read more to find out.
Read more
Attack Surface Management
Cybersecurity

How to Protect Ruby on Rails from Hackers: 7 Ways Infographic

Learn how to fix these 7 Rails vulnerabilities that commonly lead to web application compromises.
Read more
Attack Surface Management
Cybersecurity

Caught In The AWS Tarpit

While running a series of unit tests that make API calls to Amazon Web Services (AWS), tests were failing unpredictably. All driven by AWS authentication.
Read more
Attack Surface Management
Cybersecurity

What is Penetration Testing?

This is a complete overview of penetration testing. Learn about how penetration testing is used to reduce cybersecurity risk with this in-depth post.
Read more
Cybersecurity
Attack Surface Management

Tenable vs. McAfee MVM vs. Rapid7

Intel has pulled the plug on McAfee Vulnerability Manager. But will customers move with them to Rapid7 or explore other options like Tenable?
Read more
Deliver icon

Sign up for our newsletter

UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating