News
Entertainment
Science & Technology
Sport
Business & Money
Life
Culture & Art
Hobbies
8 | Follower
UpGuard Blog
31.12.2024
Discover what Third-Party Risk Management trends your organization should watch in 2025 and learn how to adjust your TPRM program accordingly.
13.12.2024
Learn the key principles of detecting and mitigating cyber threats before they develop into security incidents and data breaches.
A cyber threat intelligence strategy encourages you to think like a cybercriminal, helping you predict and intercept their next moves.
29.11.2024
Discover the primary human factors that could be disrupting the efficacy of your cybersecurity program and learn how to mitigate them.
19.11.2024
Find out how veteran Symantec's Endpoint Protection stacks up against Bit9 + Carbon Black's security solution.
For busy system administrators, Configuration Management (CM) tools like Ansible and Salt are absolute lifesavers.
Which one of these cybersecurity platforms is better for measuring enterprise cyber risk? Read more to find out.
How does Carbon Black's endpoint security platform match up against CrowdStrike's SaaS-based solution for endpoint protection? Read more to find out.
Learn more about the basic elements to bolstering your Windows environment against cyber attackers.
Interested to learn more about the origins and processes of both Docker and Vagrant? We put them head to head to see which comes out on top.
Apache is an established player in the web server market but Nginx has some strong advantages. Find out which works for you.
Companies regularly host sensitive data on Amazon's S3. Sometimes they forget to close it off to the internet. Here's a guide to make sure you don't.
Read about why your third-party vendors and test environments should not contain production data, and how to protect your customers by taking a few steps.
Check out these 5 commonly encountered problems in Puppet Enterprise and how to go about resolving them.
16.11.2024
Introducing UpGuard’s enhanced news and incident coverage. 500% better coverage to keep you ahead of the latest security threats.
14.11.2024
A sneak peek into some of the key vulnerabilities we discovered impacting ASX 200 companies in 2024.
05.11.2024
We recap the major events impacting voter data integrity in U.S. elections over the past eight years (since 2016).
01.11.2024
Learn the importance of C-SCRM and how it could benefit your strategy for detecting and mitigating supply chain cyber risks.
30.10.2024
Learn how to detect and mitigate CUPS vulnerabilities, including CVE-2024-47176.
25.10.2024
Explore how Trust Exchange is revolutionizing the security questionnaire process, freeing security teams from the burden of repetitive, manual tasks.
Find out why third-party monitoring is a critical component of every Third-Party Risk Management program.
05.10.2024
Learn what the SOCI Act reforms are and how to comply with them under the SLACIP Act.
27.09.2024
Achieve compliance with DORA, UpGuard’s latest addition to its industry-leading Questionnaire Library.
26.09.2024
Discover the latest addition to UpGuard's industry-leading Questionnaire Library and learn how to achieve comprehensive DPDP compliance.
18.09.2024
Discover UpGuard's 2024 updates to our cyber risk ratings, including enhanced risk categorization and an improved scoring algorithm.
Find out what it's is critical for large businesses hoping to minimize their risk of suffering data breaches, both internally and externally.
Learn why cyber reports are critical and why they are an essential tool for every cybersecurity program. Includes a framework for cyber report writing.
Third-party monitoring solutions are an integral component of a third-party risk management program. Here are the top contenders in 2024.
17.09.2024
This is the first in a series of blog posts around DevOps culture and lessons learned from Lencioni’s leadership book 5 Dysfunctions of a Team.
Rsync is a ubiquitous data backup tool that comes bundled with many operating systems, and configuring it properly for secure use is of utmost importance.
Find out about the key benefits and differences between two configuration management powerhouses, Microsoft's SCCM and Chef.
Interested to learn more about the origins and processes of both Heroku and AppEngine? We put them head to head to see which comes out on top.
Puppet is like writing configuration files whereas using Chef is like programming the control of your nodes.
Sumo Logic is built for the cloud; even though Splunk offers a cloud option, Sumo Logic's architecture is built around log management and time series.
How does the leading network monitoring suite compare to Microsoft's data center monitoring solution? Read more to find out.
If you host a website, chances are good that you are running either Apache or Internet Information Services (IIS). Learn more about the two providers.
Heroku is a PaaS providing hardware and software on its own infrastructure while AWS is IaaS providing virtualized computing resources over the internet.
AWS finally has a direct challenger: Google Compute Engine. Find out how they stack up on pricing and performance.
Interested to learn more about the origins and processes of both Puppet and Salt? We put them head to head to see which comes out on top.
Learn more about Foreman and Ansible Tower's enterprise-centric capabilities and how they stack up against each other.