Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

UpGuard

Cast a Wider Net: UpGuard Now Scans 5x More Sources

At UpGuard, we know that in cybersecurity, timing is everything. That’s why we’ve enhanced our news and incident scanning with 500% more coverage, bringing you faster insights from high-impact sources. Now, SOC analysts and security teams can catch incidents affecting their organization or supply chain sooner, allowing for quicker, proactive responses to mitigate threats before they escalate.

Is the ASX 200 Resilient to Cyber Threats? Our Report Says No.

In today’s rapidly evolving digital landscape, managing cyber risk has become essential for sustaining corporate growth and resilience. Cyber risk management requires balancing corporate growth against the evolving tactics of threat actors and governmental regulations – a daunting task that requires continuous measurement and strategic reflection.

What is Cyber Supply Chain Risk Management?

Cyber supply chain risk management (C-SCRM) is the process of identifying, assessing, and mitigating cybersecurity risks associated with an organization’s supply chain. Supply chains comprise multiple attack vectors, ranging from procurement tools to suppliers, developers, and third-party services. The complexity of this attack surface warrants a risk management strategy focused on supply chain risks as an extension to an existing third-party risk management program.

Understanding CVE-2024-47176: Mitigating CUPS Vulnerabilities

The Common UNIX Printing System (CUPS) is a widely used printing system on Unix-like operating systems, but recent vulnerabilities have exposed significant risks. The most critical is CVE-2024-47176, which affects the cups-browsed service by binding to the IP address INADDR_ANY:631. This configuration flaw causes it to trust all incoming packets, leading to potential remote code execution when interacting with malicious printers. This vulnerability is part of a chain of exploits, including.

How to Overcome the Security Questionnaire Burden

If you’re on the frontlines of your organization’s cybersecurity department, you’ve likely found yourself burdened by security questionnaires. Whether you’re in charge of evaluating vendor responses or completing questionnaires yourself, it’s no secret these requests can be time-consuming for everyone involved. Well, what if this didn’t have to be the case?

UpGuard Expands Vendor Risk Questionnaire Library with New DORA Questionnaire

UpGuard is excited to announce the latest addition to our Vendor Risk Questionnaire Library: the DORA (Digital Operational Resilience Act) questionnaire! The addition of DORA to the Questionnaire Library reflects UpGuard’s ongoing commitment to providing our customers with the necessary tools to navigate today’s evolving regulatory standards.

Introducing UpGuard's DPDP Act Security Questionnaire

In an era where data breaches and privacy concerns dominate headlines, regulatory frameworks like India’s Digital Personal Data Protection Act, 2023 (DPDP) have become indispensable. The DPDP Act safeguards the privacy of individuals by regulating how organizations operating in India can collect, process, and store personal data. Landmark regulations like the DPDP Act are essential for enhancing data security.

UpGuard's Cyber Risk Ratings: Enhancing Risk Categorization for 2024

Each year, we revisit our risk rating system to ensure it best reflects the needs of security practitioners safeguarding their organizations and supply chains. For our 2024 update, we’ve made two closely related changes: we’ve recategorized some of our existing findings to make an organization’s risk profile more understandable and recalibrated our scoring algorithm to more clearly illustrate the impact of specific risks.

What is Enterprise Attack Surface Management?

The rapid expansion of the digital landscape adds increasing complexity to cybersecurity, especially for enterprises that could have up to 100,000 vendors in their supply chain. Addressing these challenges requires implementing an Attack Surface Management (ASM) strategy tailored to enterprise businesses' unique risk profiles. This post outlines the importance of ASM for enterprises and offers a strategy for ensuring its effective implementation.