new
We've just launched UpGuard CyberResearch. Fully managed third-party risk and data leak detection.
Products
UpGuard BreachSight
Monitor your business for data breaches and protect your customers' trust.
UpGuard Vendor Risk
Control third-party vendor risk and improve your cyber security posture.
UpGuard CyberResearch
new
Scale third-party vendor risk and prevent costly data leaks.
Always improving
Learn about new features, changes, and improvements to UpGuard.
Release notes
Book a free demo
Pricing
Resources
Blog
Learn about the latest issues in cybersecurity and how they affect you.
Breaches
Stay up to date with security research and global news about data breaches.
eBooks, Reports, & more
Insights on cybersecurity and vendor risk management.
Latest cybersecurity news
45,000 patients potentially impacted by data breach
Hacktivists target Gab.com
Private Clubhouse chatroom audio leaked online
View all news
Customers
Community
Events
Expand your network with UpGuard Summit, webinars & exclusive events.
Newsletter
Get the latest curated cybersecurity news, breaches, events and updates.
Login
Free score
Free trial
Home
Products
UpGuard BreachSight
Attack surface management
UpGuard Vendor Risk
Third-party risk management
UpGuard CyberResearch
Managed security services
Pricing
Resources
Blog
The latest issues in cybersecurity
Breaches
Data breach research and global news
eBooks, Reports, & more
Insights on cybersecurity and vendor risk
News
In-depth reporting on data breaches and news
Customers
Community
Events
Summit, webinars & exclusive events
Newsletter
News, breaches, events and updates
Marketing Manager
Axel Sukianto
What is SQL injection?
What is SQL injection?
An SQL injection is a technique for the “injection” of SQL commands by attackers to access and manipulate databases.
Cybersecurity & Risk Management Blog
Learn more about the latest issues in cybersecurity.
14 Cybersecurity Metrics + KPIs to Track
14 Cybersecurity Metrics + KPIs to Track
Cybersecurity metrics and key performance indicators (KPIs) are an effective way to measure the success of your cybersecurity program.
Why is Cybersecurity Important?
Why is Cybersecurity Important?
If your business isn't concerned about cybersecurity, it's only a matter of time before you're an attack victim. Learn why cybersecurity is important.
What Is Third-Party Risk Management?
What Is Third-Party Risk Management?
This is a complete guide to third-party risk management. Learn how to reduce third-party and fourth-party risk with this in-depth post.
How to Manage Third-Party Risk
How to Manage Third-Party Risk
This is a complete overview of how to manage third-party risk. Learn about common causes of third-party risks and how to mitigate them in this post.
9 Ways to Prevent Third-Party Data Breaches
9 Ways to Prevent Third-Party Data Breaches
This is a complete guide to preventing third-party data breaches. Learn about how organizations like yours are keeping themselves and their customers safe.
What is Typosquatting (and how to prevent it)
What is Typosquatting (and how to prevent it)
Learn about the dangers of typosquatting and what your business can do to protect itself from this malicious threat.
All blog posts
Book a free demo
Book a free, personalized onboarding call with one of our cybersecurity experts.
Contact sales
Free demo