Cindy from our GRC team shares how UpGuard’s trust page helps speed up security reviews, reduce friction in sales, and build trust with prospects—plus practical tips to help you do the same.
In this fireside chat, Randy Vickers, Deputy CISO at the National Student Clearinghouse, shares hard-earned lessons on securing sensitive data at scale, navigating vendor risk, and leading high-impact security programs—especially when budgets are tight and threats are evolving fast.
Dan Bradbury, Chief Product Officer at UpGuard, kicks off our 20th Summit with a look at how far we’ve come—and where we’re headed. From AI-powered risk assessments to expanded threat intelligence, discover what’s new, what’s next, and how your feedback continues to shape our roadmap.
Organizations are still struggling to manage vendor-related cyber risk effectively. According to a recent study by Imprivata and the Ponemon Institute, nearly half of organizations fall victim to data breaches involving third-party network access. This isn't just another statistic. It's a critical cybersecurity issue hinting at broader limitations of traditional TPRM programs.
By now we’re all familiar with the capabilities of generative AI for creating images. For some tasks, like casting an existing image in a recognizable art style, it works well. Much more than that and it encounters limitations: complex prompts often don’t return exactly what you imagined and iterating on a failed prompt can quickly become time-consuming.
Online fraud remains a significant and rapidly expanding threat in today's cyber threat landscape. According to the FTC, consumers in the U.S. lost a staggering $12.5 billion to fraud in 2024, a 25% surge from the previous year. The most commonly reported category? Imposter scams. This difficult-to-intercept form of fraud alone accounted for $2.95 billion of those losses.
Today, the average phishing email that lands in your CEO's inbox is flawless. It uses perfect grammar, contains an intimate understanding of your organization’s current business landscape, and ends with an urgent, contextually relevant request. This isn't the work of a typical cybercriminal; it's the hallmark of generative AI being weaponized, transforming social engineering from a numbers game into a targeted strike.
Picture this: your vendor’s latest security audit just landed in your inbox, and you spot multiple failure points. What’s your immediate action plan? Failed vendor audits are an uncomfortable but increasingly common reality as reliance on third-party vendors grows, and handling them poorly can lead to data breaches, costly compliance violations, and serious operational disruptions. Knowing how to respond effectively isn't just good practice—it's essential risk management.
When you hear the word “ransomware,” many people think of a lone hacker launching a complex cyberattack. However, ransomware attacks that paralyze businesses worldwide have evolved into the product of a highly organized, industrialized criminal ecosystem. Their secret weapon? Ransomware-as-a-Service, or RaaS.
Is your team's favorite new productivity tool also your biggest data leak waiting to happen? Generative AI (GenAI) assistants like ChatGPT, Microsoft Copilot, and Google Gemini have quickly moved from novelty to necessity in many workplaces. These tools use machine learning and advanced algorithms to help employees draft content, analyze data, and even write code faster than ever before.