Cybersecurity

Articles, news, and research on cybersecurity.

Cybersecurity

Cybersecurity
Third-Party Risk Management

Introducing UpGuard's New SIG Lite Questionnaire

Streamline your data collection and vendor risk assessments with UpGuard’s SIG Lite risk-mapped questionnaire.
Read more
Cybersecurity

What is Network Segmentation? Virtual & Physical Segmentation

Learn more about network segmentation and the differences between physical and virtual segmentation techniques.
Read more
Cybersecurity

Creating a Cybersecurity Report for Senior Management in 2024

Senior management has a unique set of reporting requirements. Learn what they are and how to create a cybersecurity report optimized for this audience.
Read more
Cybersecurity

Creating a Vendor Risk Summary Cybersecurity Report

Learn the best practices for putting together a vendor risk report that keeps your stakeholders updated about the strength of your VRM efforts.
Read more
Cybersecurity

Choosing the Best Tool for Cybersecurity Audits

Cybersecurity audits are a great resource to enhance your organization's security posture. Explore what to look for in an audit tool in this blog post.
Read more
Cybersecurity

What is a Hard Token? Hardware Security Tokens Vs Soft Tokens

Learn more about hard tokens and discover the differences between hardware security tokens and soft tokens.
Read more
Cybersecurity

How to Create a Cybersecurity Board Report (3 Best Practices)

Learn the three best practices for creating a cybersecurity board report that will satisfy even the most difficult board members
Read more
Cybersecurity

The Future of Cybersecurity: ChatGPT For Risk Management?

Discover how ChatGPT is being utilized for third-party risk management, and learn how the chatbot stacks up against a proven TPRM solution
Read more
Cybersecurity

8 Black Kite Competitors & Alternatives: Comparison & Review

Discover 8 cybersecurity alternatives and competitors to Black Kite and compare and contrast each platform's most popular features.
Read more
Cybersecurity

Why is the Finance Sector a Target for Cyber Attacks?

Find out why the finance sector is targeted by cyber attacks and the steps they can take to prevent security breaches.
Read more
Cybersecurity

Cybersecurity and Social Responsibility: Ethical Considerations

Learn how ethics plays a part in the cybersecurity industry and other social responsibility considerations.
Read more
Cybersecurity

Cybersecurity in the Entertainment Industry: Risks and Solutions

Find out how cybersecurity affects the entertainment industry and methods for preventing cyber attacks.
Read more
Cybersecurity

Why is the Education Sector a Target for Cyber Attacks?

Find out why the education sector is targeted by cyber attacks and how they can prevent it.
Read more
Cybersecurity

Why is the Tech Sector a Target for Cyber Attacks?

Find out why the tech sector is a common target for cyber attacks and strategies for prevention.
Read more
Cybersecurity

Cybersecurity in the Hospitality Industry: Challenges and Solutions

Find out how cybersecurity affects the hospitality industry and examples of recent cyberattacks.
Read more
Cybersecurity

Choosing a Financial Services Cyber Risk Remediation Product

Learn which critical features are included in the most effective risk remediation tools when managing security risks in the finance sector.
Read more
Deliver icon

Sign up for our newsletter

Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating

Book a free demo

Book a free, personalized onboarding call with one of our cybersecurity experts.