News
Entertainment
Science & Technology
Sport
Business & Money
Life
Culture & Art
Hobbies
8 | Follower
UpGuard Blog
30.01.2025
Shadow AI is the use of unauthorized AI solutions in the workplace. This article explores this unsanctioned use in more detail.
16.01.2025
Not all departments respect the information security rules established by the IT department. And the result of this insurrection is Shadow IT.
Learn how to detect SQL injection and path traversal vulnerabilities across your infrastructure.
10.01.2025
Differences between the declarative and imperative models can be summed up in one sentence: imperative focuses on how and declarative focuses on what.
Learn how Indian organizations can overcome industry challenges to address and mitigate the cybersecurity risks threatening their data security.
09.01.2025
Learn about reverse proxies and how they could support your cybersecurity objectives.
The Metasploit Framework is an open-source framework that is used to find, exploit, and validate system vulnerabilities. Learn more about how it works.
Kerberos is a network authentication protocol that secures user access to services/applications through secret-key cryptography. Learn how it works.
08.01.2025
Learn about the best 10 configuration management tools and the pros and cons of each so you can figure out which is best fit for your DevOps organization.
Learn how to fix the top 10 security vulnerabilities and exploits on Microsoft's Windows 10 operating system and prevent your systems from being exploited.
A quick explanation of the differences between cybersecurity and ethical hacking.
OAuth grants websites and applications access to users' information on other services without providing important credentials like passwords.
This article outlines the ways hackers can exploit MFA and how to protect your organization’s sensitive data from such attacks.
An intrusion detection system (IDS) is a software application or hardware device that detects cyber attacks. Learn more about how it works and its uses.
IOAs, when used in conjunction with IOCs, can significantly increase the efficacy of cybersecurity programs defending against data breaches.
Reverse proxies and load balancers have some features in common but aren't quite the same thing. Learn more.
CIFS (Common Internet File System) is a network protocol that allows clients to communicate with servers and access file sharing and print services.
06.01.2025
If you must use a USB flash drive for data storage (not recommended), there are ways to improve your data security. Learn how to secure your thumb drive.
Learn the difference between two core concepts of information security: authenticity and non-repudiation.
Ansible is a configuration management tool and orchestration engine that doesn't use master-and-minions setup. Ansible Tower is a UI, dashboard, and API.
The key difference between CIFS and SMB is that CIFS is a dialect of SMB – a particular implementation of the SMB protocol. Learn more.
Configuration management (CM) is a systems engineering process for establishing and maintaining consistency of a system's attributes.
Find out how SIM cards can get hacked and why you need to be careful.
31.12.2024
Discover what Third-Party Risk Management trends your organization should watch in 2025 and learn how to adjust your TPRM program accordingly.
13.12.2024
A cyber threat intelligence strategy encourages you to think like a cybercriminal, helping you predict and intercept their next moves.
Learn the key principles of detecting and mitigating cyber threats before they develop into security incidents and data breaches.
29.11.2024
Discover the primary human factors that could be disrupting the efficacy of your cybersecurity program and learn how to mitigate them.
19.11.2024
For busy system administrators, Configuration Management (CM) tools like Ansible and Salt are absolute lifesavers.
Read about why your third-party vendors and test environments should not contain production data, and how to protect your customers by taking a few steps.
How does Carbon Black's endpoint security platform match up against CrowdStrike's SaaS-based solution for endpoint protection? Read more to find out.
Companies regularly host sensitive data on Amazon's S3. Sometimes they forget to close it off to the internet. Here's a guide to make sure you don't.
Which one of these cybersecurity platforms is better for measuring enterprise cyber risk? Read more to find out.
Interested to learn more about the origins and processes of both Docker and Vagrant? We put them head to head to see which comes out on top.
Check out these 5 commonly encountered problems in Puppet Enterprise and how to go about resolving them.
Apache is an established player in the web server market but Nginx has some strong advantages. Find out which works for you.
Find out how veteran Symantec's Endpoint Protection stacks up against Bit9 + Carbon Black's security solution.
Learn more about the basic elements to bolstering your Windows environment against cyber attackers.
16.11.2024
Introducing UpGuard’s enhanced news and incident coverage. 500% better coverage to keep you ahead of the latest security threats.
14.11.2024
A sneak peek into some of the key vulnerabilities we discovered impacting ASX 200 companies in 2024.
05.11.2024
We recap the major events impacting voter data integrity in U.S. elections over the past eight years (since 2016).