Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

July 2024

CrowdStrike Outage: What Happened and How to Limit Future Risk

In the early morning of July 19, a software update to CrowdStrike’s Falcon sensor started to cause one of the most extensive IT outages in history, affecting several industry sectors, including financial services, healthcare, transportation, and others. According to CrowdStrike, the outage stemmed from “a defect found in a Falcon content update for Windows hosts.” At this point, the software update has not affected Mac and Linux systems.

Preparing for Cybersecurity Audits: Insights from US Regulations

Cybersecurity regulations often include audits that assess and strengthen an organization’s defenses against increasing cyber threats. In the United States, various cybersecurity regulations, including HIPAA, SOX, PCI DSS, and more, require audits. Each audit ensures your organization meets the required standards outlined in the regulation while also strengthening its overall cybersecurity framework.

Navigating Cybersecurity Requirements Under the Dodd-Frank Act

Over the last decade, cybersecurity has emerged as a critical concern for financial institutions. With cyberattacks increasing in frequency and sophistication, it has become imperative for institutions in the financial sector to safeguard sensitive data and implement robust data protection measures. The Dodd-Frank Wall Street Reform and Consumer Protection Act, commonly known as the Dodd-Frank Act, plays a crucial role in regulating the American financial services industry.

India's Blueprint for Cyber Safety: The National Security Policy 2013

India's National Cyber Security Policy 2013 is a comprehensive framework designed to fortify the nation's cyber infrastructure and safeguard its digital frontiers. The policy aims to address the complexities of cyber threats and enhance cyberspace's security and resilience through various key components and targeted strategies.

Improving India's Cyber Defenses: Maharashtra's Cyber Security Project

In an era when digital transformation is reshaping economies and societies, the threat of cybercrime has become a significant concern. India, with its growing digital ecosystem, is particularly vulnerable to a wide range of cyber threats. In response to these challenges, the state of Maharashtra launched an ambitious initiative - the Maharashtra Cyber Security Project.

Guide to SWIFT CSCF (Customer Security Controls Framework)

The SWIFT Customer Security Controls Framework (CSCF) is a key global cybersecurity framework that provides recommended and mandatory security controls for banking institutions that use the SWIFT banking system. The framework is designed to help financial institutions improve their cyber resilience and ensure that participants within the SWIFT network adhere to a stringent set of security compliance standards. Find out how UpGuard helps the financial services industry meet compliance standards >

How to Prepare for Cyber Essentials Assessment

In today's world, where cyber threats are increasingly sophisticated, organizations must take strong security measures to protect sensitive data and maintain operational integrity. One effective way to show your dedication to cybersecurity is by obtaining Cyber Essentials certification. This government-backed scheme in the UK helps organizations implement essential security controls to defend against common online threats.

How to Create a Vendor Risk Management Process

Modern business operations have become synonymous with outsourcing to vendors, as essentially every business relies on at least a few third-party partnerships to improve efficiency and enhance capabilities. However, these partnerships also present various cybersecurity risks that can negatively impact an organization’s performance, reputation, and compliance with industry regulations and standards. To mitigate these risks, organizations must develop a robust Vendor Risk Management (VRM) process.

GDPR: Penalties for Noncompliance and How to Avoid Them

The General Data Protection Regulation (GDPR) is one of the world's most stringent data protection laws, designed to safeguard individuals' personal data in Europe. Since its implementation in May 2018, GDPR has significantly impacted how organizations collect, store, and process personal data. Noncompliance with GDPR can lead to severe penalties, including hefty fines and reputational damage, making it imperative for organizations to understand and adhere to its requirements.

Managing Third-Party Cyber Risk in Financial Services

In today's interconnected financial landscape, businesses face increasing risks from third-party vendors, making effective cyber risk management essential. Significant data breach costs and stringent regulatory requirements place further burden on this sector. In response, UpGuard offers a Vendor Risk Management solution to help institutions manage these risks and maintain compliance. Learn more at upguard.com/fsi.

G2 Names UpGuard #1 TPRM Software - Summer 2024

We are delighted to announce that UpGuard has once again been recognized as the Leader in Third-Party and Supplier Risk Management Software by G2. The publication of G2's Summer 2024 report marks eight consecutive quarters were UpGuard was named a Category Leader. Established in 2012, G2 is a trusted resource for software reviews and customer feedback. It guides over 90 million users, including employees from all Fortune 500 companies, in making informed software choices.