UpGuard

Security Ratings Explained:The Problem of Digitization

This post was originally published here by  UpGuard. The digitization of business has increased the speed of commerce, the scope of customers, the understanding of consumer habits, and the efficiency of operations across the board. It has also increased the risk surface of business, creating new dangers and obstacles for the business itself, not just […]

Resilience in the Age of Automated Hacking

This post was originally published here . When we think about cyber attacks, we usually think about the malicious actors behind the attacks, the people who profit or gain from exploiting digital vulnerabilities and trafficking sensitive data. In doing so, we can make the mistake of ascribing the same humanity to their methods, thinking of […]

Security Ratings Explained

This post was originally published here . The Problem of Digitization The digitization of business has increased the speed of commerce, the scope of customers, the understanding of consumer habits, and the efficiency of operations across the board. It has also increased the risk surface of business, creating new dangers and obstacles for the business […]

Infrastructure Indexing: or, Why Server Headers Matter More than Ever

This post was originally published here . When we think about cyber attacks, we usually think about the malicious actors behind the attacks, the people who profit or gain from exploiting digital vulnerabilities and trafficking sensitive data. In doing so, we can make the mistake of ascribing the same humanity to their methods, thinking of […]

UpGuard CyberRisk and Fair and Accurate Security Ratings Principles

This post was originally published here . In June of 2017 the U.S. Chamber of Commerce posted the “Principles for Fair and Accurate Security Ratings,” a document supported by a number of organizations interested in the emerging market for measuring cyber risk. The principles provide a starting point for understanding the current state of security ratings and for establishing […]

Cyber Resilience: What It Is and Why You Need It

This post was originally published here . The way businesses handle the risks posed by their technology is changing. As with anything, adaptability is survivability. When the techniques, methods, and philosophies of the past aren’t working, the time has come to find something better to replace them. Cyber resilience is a set of practices and perspectives that […]

How to Build a Sustainable Digital Business in the Cloud

This post was originally published here by UpGuard. Technology and Information How much digital technology is required for your business to operate? Unless this document has traveled back in time, the chances are quite a lot. Now consider how much digital technology your vendors require to operate. The scope of technology grows quickly when you […]

How Can Cloud Leaks Be Prevented?

This post was originally published here by UpGuard. When we examined the differences between breaches, attacks, hacks, and leaks, it wasn’t just an academic exercise. The way we think about this phenomenon affects the way we react to it. Put plainly: cloud leaks are an operational problem, not a security problem. Cloud leaks are not […]

Amazon Storage leaks personal data of 14 million Verizon Customers

Personal data of more than 14 million Verizon customers was leaked on Tuesday this week due to a misconfiguration on Amazon Web Services storage bucket. Hence, cyber incidents such as this highlight the importance of data protection practices on cloud platforms. The security lapse was discovered by a research firm called UpGuard. And as per […]

Procedures: Runbook Automation that Works

This post was originally published here by Greg Pollock. One of the challenges of building and running information technology systems is solving novel problems. That’s where frameworks like scrum and agile come in– getting from the unknown to the known with a minimum of frustration and waste. Another challenge is performing known tasks correctly every […]

UpGuard is the only platform that provides CSTAR, the CyberSecurity Threat Assessment Report. CSTAR looks at your infrastructure from the inside-out and provides an easy-to-understand risk score which insurers can use in determining a fair premium for cybersecurity insurance. Our customers use UpGuard to accelerate DevOps initiatives, identify critical security gaps and vulnerabilities, streamline auditing and compliance testing, and gain visibility into the true state of their infrastructure.
Share this page