News
Entertainment
Science & Technology
Sport
Business & Money
Life
Culture & Art
Hobbies
8 | Follower
UpGuard Blog
19.11.2024
How does Carbon Black's endpoint security platform match up against CrowdStrike's SaaS-based solution for endpoint protection? Read more to find out.
Apache is an established player in the web server market but Nginx has some strong advantages. Find out which works for you.
Learn more about the basic elements to bolstering your Windows environment against cyber attackers.
Companies regularly host sensitive data on Amazon's S3. Sometimes they forget to close it off to the internet. Here's a guide to make sure you don't.
Read about why your third-party vendors and test environments should not contain production data, and how to protect your customers by taking a few steps.
For busy system administrators, Configuration Management (CM) tools like Ansible and Salt are absolute lifesavers.
Check out these 5 commonly encountered problems in Puppet Enterprise and how to go about resolving them.
Interested to learn more about the origins and processes of both Docker and Vagrant? We put them head to head to see which comes out on top.
Find out how veteran Symantec's Endpoint Protection stacks up against Bit9 + Carbon Black's security solution.
Which one of these cybersecurity platforms is better for measuring enterprise cyber risk? Read more to find out.
16.11.2024
Introducing UpGuard’s enhanced news and incident coverage. 500% better coverage to keep you ahead of the latest security threats.
14.11.2024
A sneak peek into some of the key vulnerabilities we discovered impacting ASX 200 companies in 2024.
05.11.2024
We recap the major events impacting voter data integrity in U.S. elections over the past eight years (since 2016).
01.11.2024
Learn the importance of C-SCRM and how it could benefit your strategy for detecting and mitigating supply chain cyber risks.
30.10.2024
Learn how to detect and mitigate CUPS vulnerabilities, including CVE-2024-47176.
25.10.2024
Explore how Trust Exchange is revolutionizing the security questionnaire process, freeing security teams from the burden of repetitive, manual tasks.
Find out why third-party monitoring is a critical component of every Third-Party Risk Management program.
05.10.2024
Learn what the SOCI Act reforms are and how to comply with them under the SLACIP Act.
27.09.2024
Achieve compliance with DORA, UpGuard’s latest addition to its industry-leading Questionnaire Library.
26.09.2024
Discover the latest addition to UpGuard's industry-leading Questionnaire Library and learn how to achieve comprehensive DPDP compliance.
18.09.2024
Third-party monitoring solutions are an integral component of a third-party risk management program. Here are the top contenders in 2024.
Learn why cyber reports are critical and why they are an essential tool for every cybersecurity program. Includes a framework for cyber report writing.
Discover UpGuard's 2024 updates to our cyber risk ratings, including enhanced risk categorization and an improved scoring algorithm.
Find out what it's is critical for large businesses hoping to minimize their risk of suffering data breaches, both internally and externally.
17.09.2024
Find out about the key benefits and differences between two configuration management powerhouses, Microsoft's SCCM and Chef.
Rsync is a ubiquitous data backup tool that comes bundled with many operating systems, and configuring it properly for secure use is of utmost importance.
AWS finally has a direct challenger: Google Compute Engine. Find out how they stack up on pricing and performance.
Sumo Logic is built for the cloud; even though Splunk offers a cloud option, Sumo Logic's architecture is built around log management and time series.
Heroku is a PaaS providing hardware and software on its own infrastructure while AWS is IaaS providing virtualized computing resources over the internet.
This is the first in a series of blog posts around DevOps culture and lessons learned from Lencioni’s leadership book 5 Dysfunctions of a Team.
How does the leading network monitoring suite compare to Microsoft's data center monitoring solution? Read more to find out.
How much do outages like today's Amazon.com glitch actually cost online retailers? Read more to find out.
Interested to learn more about the origins and processes of both Salt and Chef? We put them head to head to see which comes out on top.
Interested to learn more about the origins and processes of both Heroku and AppEngine? We put them head to head to see which comes out on top.
Interested to learn more about the origins and processes of both OpsWorks and Hosted Chef? We put them head to head to see which comes out on top.
Learn more about Foreman and Ansible Tower's enterprise-centric capabilities and how they stack up against each other.
If you host a website, chances are good that you are running either Apache or Internet Information Services (IIS). Learn more about the two providers.
Interested to learn more about the origins and processes of both Puppet and Salt? We put them head to head to see which comes out on top.
Puppet is like writing configuration files whereas using Chef is like programming the control of your nodes.
Every cyber risk management solution measures risk differently. But which method is most effective to prevent breaches down the road, and why?