Cybersecurity

Articles, news, and research on cybersecurity.

Cybersecurity

Cybersecurity

What is IT Risk Management? Strategies and Processes

A comprehensive explanation of what IT risk management is and how it can be implemented in your cybersecurity program.
Read more
Cybersecurity

Should Australian Businesses Pay Ransoms to Cybercriminals?

Ransomware attacks are on the rise. Learn how to best respond to criminal threats without breaking any Australian laws.
Read more
Cybersecurity

Data Loss vs. Data Leaks: What's the Difference?

Data loss and data leaks are two different events that place your sensitive at risk. Learn what the differences are and how to mitigate each incident.
Read more
Cybersecurity

Inherent Risk vs. Residual Risk (Explained in 58 Seconds)

A super quick lesson about the differences between inherent and residual risks.
Read more
Cybersecurity

What is a DDoS Attack? How they Work + Protection Strategies

Any web server can be crippled in a DDoS attack. Learn about this devastating cyberattack and how to defend yourself.
Read more
Cybersecurity

How to be Compliant with Biden's Cybersecurity Executive Order in 2025

The United States President has signed a Cybersecurity Executive Order that calls for a complete reformation of cybersecurity standards.
Read more
Cybersecurity

What is FIPS 140-3? The Critical Updates You Must Be Aware Of

Learn about the key differences between FIPS 140-3 and FIPS 140-2 and how you can get validated in 2021.
Read more
Cybersecurity

What is Threat Modelling? 10 Threat Identity Methods Explained

If you can predict the threats that will test your security resilience you can improve your cybersecurity. Learn how.
Read more
Cybersecurity

Urgent: 5 CVEs Being Exploited Right Now by SVR

The SolarWinds attackers have finally been named and they're currently targeting 5 vulnerabilities. Learn what they are and how you can protect yourself.
Read more
Cybersecurity

What is Digital Risk? Definition and Protection Tactics

Every organization is. exposed to digital risks. Learn about the different types of risks and how you can best protect your ecosystem.
Read more
Cybersecurity

Digital Risk Protection Service (DRPS): Definition + Top Features

With the right Digital Risk Protection Service (DRPS) it's possible to mitigate digital risk while expanding your digital landscape.
Read more
Cybersecurity

Digital Risk Protection Explained

Learn about digital risk protection, how to implement it with a step-by-step framework, and how to safeguard your organization from modern digital threats.
Read more
Attack Surface Management
Data Breaches
Cybersecurity
Third-Party Risk Management

Honeytokens as a Defense Against Supply Chain Attacks

Supply chain attacks are on the rise but their attempts could be detected with Honeytokens. Learn how to implement them into your cybersecurity.
Read more
Data Breaches
Cybersecurity

Assume Breach Mentality vs. Supply Chain Attacks in 2025

Supply chain attacks could be prevented if all network activity is assumed to be malicious. Learn how to implement an Assume Breach framework.
Read more
Attack Surface Management
Cybersecurity
Data Breaches

Zero Trust as a Defence Against Supply Chain Attacks

A Zero Trust Architecture is one of the most effective defenses against Supply Chain attacks. Learn how to implement this framework in 7 steps.
Read more
Compliance and Regulations
Cybersecurity

10-Step Checklist: GDPR Compliance Guide

GDPR compliance is mandatory but few organizations know how to align with its tenants. In this post, we break down the framework in 10 steps.
Read more
Deliver icon

Sign up for our newsletter

UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating