Last updated today
No recent security news.
More security reports
Zappos.com is an online shoe and clothing retailer based in Las Vegas, Nevada. The company was founded in 1999 by Nick Swinmurn and launched under the domain name Shoesite.com. In July 2009, Amazon acquired Zappos in an all-stock deal worth around $1.2 billion at the time.
Motorola Solutions, Inc. is an American data communications and telecommunications equipment provider that succeeded Motorola, Inc., following the spinoff of the mobile phone division into Motorola Mobility in 2011. The company is headquartered in Chicago, Illinois.
Verizon Communications Inc., or simply Verizon, is an American multinational telecommunications conglomerate and a corporate component of the Dow Jones Industrial Average. The company is based at 1095 Avenue of the Americas in Midtown Manhattan, New York City, but is incorporated in Delaware.
Ticketmaster Entertainment, Inc. is an American ticket sales and distribution company based in Beverly Hills, California with operations in many countries around the world. In 2010 it merged with Live Nation under the name Live Nation Entertainment.
Cybersecurity & Risk Management Library
The ultimate guide to attack surface and third-party risk management – actionable advice for security teams, managers, and executives.
Security research and global news about data breaches.
Third-party risk management
Articles, news, and research on third-party risk management.
Attack Surface Management
Articles, news, and research on attack surface management.
Articles, news, and research on cybersecurity.
Leader in Third Party & Supplier Risk Management Software
See how UpGuard shapes up against other platforms in the market.
"This is some text inside of a div block."
Free instant security score
How secure is your organization?
Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
- Instant insights you can act on immediately
- Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities