Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From Compliance to Cyber Resilience: Leadership Lessons from the Frontline

In this fireside chat, Randy Vickers, Deputy CISO at the National Student Clearinghouse, shares hard-earned lessons on securing sensitive data at scale, navigating vendor risk, and leading high-impact security programs—especially when budgets are tight and threats are evolving fast.

Staying Ahead of Evolving Cyber Threats: What Security Teams Need to Know

Dan Bradbury, Chief Product Officer at UpGuard, kicks off our 20th Summit with a look at how far we’ve come—and where we’re headed. From AI-powered risk assessments to expanded threat intelligence, discover what’s new, what’s next, and how your feedback continues to shape our roadmap.

47% of Breaches Involve Vendors: Is Your TPRM Ready?

Organizations are still struggling to manage vendor-related cyber risk effectively. According to a recent study by Imprivata and the Ponemon Institute, nearly half of organizations fall victim to data breaches involving third-party network access. This isn't just another statistic. It's a critical cybersecurity issue hinting at broader limitations of traditional TPRM programs.

Detecting Generative AI Data Leaks from ComfyUI

By now we’re all familiar with the capabilities of generative AI for creating images. For some tasks, like casting an existing image in a recognizable art style, it works well. Much more than that and it encounters limitations: complex prompts often don’t return exactly what you imagined and iterating on a failed prompt can quickly become time-consuming.

Digital Brand Protection in the Age of Impersonation

Online fraud remains a significant and rapidly expanding threat in today's cyber threat landscape. According to the FTC, consumers in the U.S. lost a staggering $12.5 billion to fraud in 2024, a 25% surge from the previous year. The most commonly reported category? Imposter scams. This difficult-to-intercept form of fraud alone accounted for $2.95 billion of those losses.

AI Just Rewrote the Rules of BEC: Are Your Defenses Ready?

Today, the average phishing email that lands in your CEO's inbox is flawless. It uses perfect grammar, contains an intimate understanding of your organization’s current business landscape, and ends with an urgent, contextually relevant request. This isn't the work of a typical cybercriminal; it's the hallmark of generative AI being weaponized, transforming social engineering from a numbers game into a targeted strike.

Beyond the Red Flags: Responding to a Failed Vendor Audit

Picture this: your vendor’s latest security audit just landed in your inbox, and you spot multiple failure points. What’s your immediate action plan? Failed vendor audits are an uncomfortable but increasingly common reality as reliance on third-party vendors grows, and handling them poorly can lead to data breaches, costly compliance violations, and serious operational disruptions. Knowing how to respond effectively isn't just good practice—it's essential risk management.

Ransomware Inc: Decoding the RaaS Business Model

When you hear the word “ransomware,” many people think of a lone hacker launching a complex cyberattack. However, ransomware attacks that paralyze businesses worldwide have evolved into the product of a highly organized, industrialized criminal ecosystem. Their secret weapon? Ransomware-as-a-Service, or RaaS.

The Shadow AI Data Leak Problem No One's Talking About

Is your team's favorite new productivity tool also your biggest data leak waiting to happen? Generative AI (GenAI) assistants like ChatGPT, Microsoft Copilot, and Google Gemini have quickly moved from novelty to necessity in many workplaces. These tools use machine learning and advanced algorithms to help employees draft content, analyze data, and even write code faster than ever before.