Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

UpGuard

VPN Security Concerns

Many organizations use virtual private networks (VPNs) to extend secure access to remote employees. A VPN creates a secure connection between two networks over the public internet, creating a level of online privacy for remote workers. A VPN internet connection will route your web traffic through an encrypted tunnel (even when using public wi-fi), protecting business sensitive data from interception. VPNs require authentication, which can help maintain your network security.

Using TPRM to Protect Intellectual Property in University Research

University-industry collaborations and other joint research ventures offer access to resources, expertise, funding, and other benefits for university researchers. However, through the use of unvetted software, password sharing, and other actions these external partnerships can expose the university and its intellectual assets to substantial cybersecurity threats, such as unauthorized access, data breaches, and other cyber attacks.

In-House vs Outsourced Third-Party Risk Management

Today’s cybersecurity landscape is teeming with third-party threats: supply chain risks, regulatory compliance requirements, third-party security flaws, malicious insiders, and more. Whether your organization’s risk appetite craves conservative or aggressive third-party relationships, these risks make third-party risk management (TPRM) necessary.

TPRM & FINRA Compliance: Regulatory Notice 21-29

The United States Congress first authorized the Financial Industry Regulatory Authority (FINRA) to protect American investors and oversee the broker-dealer industry in 2007. FINRA is an independent regulatory organization that upholds its obligation and ensures a fair market by establishing rules to regulate business activities and improve the security of member firms and other market participants. With few exceptions, most broker-dealer firms must register with FINRA.

Don't Git Attacked: How Git Protects Against Source Code Exposure

Git is a distributed version control system that empowers developers with version control features and local repositories. In most production settings, Git is paired with a hosted service for distributed access with minimal repository configuration requirements. However, using a hosted server for source control can introduce new attack vectors in source control management (SCM). This article provides suggestions for security concerns around Git use.

Protecting Student-Athlete Data: TPRM for Collegiate Athletics

American college athletics is a foundational pillar of higher education institutions and a profitable business model for universities. The National Collegiate Athletic Association (NCAA), which regulates college athletics, reported that in 2020, Division I schools earned $15.7 billion in athletics revenue. In 2023, NCAA Division I school Ohio State University reported a record-breaking revenue of over $275 million from its athletic department alone.

Building a Business Case for Investment in TPRM Software

Third-party risk management (TPRM) software is essential for any organization that utilizes third-party providers. If not monitored and managed, third-party vendors pose significant risks to the companies they work with, including cybersecurity, operational, financial, and legal/regulatory/compliance risks. TPRM software works seamlessly to help reduce this risk and provides your organization with ongoing monitoring to address vulnerabilities before they become significant security incidents.

Navigating Cloud Security: Free Questionnaire

Cloud-based solutions are becoming increasingly common in businesses across industries. Utilizing the cloud allows organizations to seamlessly access data across devices and users, making operations more efficient using digital transformation. However, cloud solutions also present many security concerns, increasing the need for cloud security.

How to Comply with NIST SP 800-171 Revision 3

The National Institute of Standards and Technology (NIST) developed the NIST 800-171 framework to set guidelines and security requirements for protecting controlled unclassified information (CUI). NIST first created the framework in June 2015 but has since revised the publication several times, most recently in November 2023.