Last updated today
LEAP Legal Software is a provider of cloud-based legal practice management software, offering a range of tools and services to help law firms manage their practice more efficiently and effectively. The company's products include case management, document automation, time and billing, and legal research tools, designed to streamline workflows and improve productivity.
Last updated today
No recent security news.
More security reports
Yahoo! is an American web services provider headquartered in Sunnyvale, California, and owned by Verizon Media. The original Yahoo! company was founded by Jerry Yang and David Filo in January 1994 and was incorporated on March 2, 1995. Yahoo was one of the pioneers of the early Internet era in the 1990s.
Amazon.com, Inc. is an American electronic commerce and cloud computing company founded by Jeff Bezos in 1994.
Deloitte Touche Tohmatsu Limited, commonly referred to as Deloitte, is a multinational professional services network. Deloitte is one of the "Big Four" accounting organizations and the largest professional services network in the world by revenue and number of professionals.
Cybersecurity & Risk Management Library
The ultimate guide to attack surface and third-party risk management – actionable advice for security teams, managers, and executives.
Security research and global news about data breaches.
Third-party risk management
Articles, news, and research on third-party risk management.
Attack Surface Management
Articles, news, and research on attack surface management.
Articles, news, and research on cybersecurity.
Leader in Third Party & Supplier Risk Management Software
See how UpGuard shapes up against other platforms in the market.
"This is some text inside of a div block."
Free instant security score
How secure is your organization?
Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
- Instant insights you can act on immediately
- Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities