UpGuard
Security Ratings Explained:The Problem of Digitization
This post was originally published here by UpGuard. The digitization of business has increased the speed of commerce, the scope of customers, the understanding of consumer habits, and the efficiency of operations across the board. It has also increased the risk surface of business, creating new dangers and obstacles for the business itself, not just […]
Resilience in the Age of Automated Hacking
This post was originally published here . When we think about cyber attacks, we usually think about the malicious actors behind the attacks, the people who profit or gain from exploiting digital vulnerabilities and trafficking sensitive data. In doing so, we can make the mistake of ascribing the same humanity to their methods, thinking of […]
Infrastructure Indexing: or, Why Server Headers Matter More than Ever
This post was originally published here . When we think about cyber attacks, we usually think about the malicious actors behind the attacks, the people who profit or gain from exploiting digital vulnerabilities and trafficking sensitive data. In doing so, we can make the mistake of ascribing the same humanity to their methods, thinking of […]
UpGuard CyberRisk and Fair and Accurate Security Ratings Principles
This post was originally published here . In June of 2017 the U.S. Chamber of Commerce posted the “Principles for Fair and Accurate Security Ratings,” a document supported by a number of organizations interested in the emerging market for measuring cyber risk. The principles provide a starting point for understanding the current state of security ratings and for establishing […]
Cyber Resilience: What It Is and Why You Need It
This post was originally published here . The way businesses handle the risks posed by their technology is changing. As with anything, adaptability is survivability. When the techniques, methods, and philosophies of the past aren’t working, the time has come to find something better to replace them. Cyber resilience is a set of practices and perspectives that […]
How to Build a Sustainable Digital Business in the Cloud
This post was originally published here by UpGuard. Technology and Information How much digital technology is required for your business to operate? Unless this document has traveled back in time, the chances are quite a lot. Now consider how much digital technology your vendors require to operate. The scope of technology grows quickly when you […]
How Can Cloud Leaks Be Prevented?
This post was originally published here by UpGuard. When we examined the differences between breaches, attacks, hacks, and leaks, it wasn’t just an academic exercise. The way we think about this phenomenon affects the way we react to it. Put plainly: cloud leaks are an operational problem, not a security problem. Cloud leaks are not […]
Amazon Storage leaks personal data of 14 million Verizon Customers
Personal data of more than 14 million Verizon customers was leaked on Tuesday this week due to a misconfiguration on Amazon Web Services storage bucket. Hence, cyber incidents such as this highlight the importance of data protection practices on cloud platforms. The security lapse was discovered by a research firm called UpGuard. And as per […]
Procedures: Runbook Automation that Works
This post was originally published here by Greg Pollock. One of the challenges of building and running information technology systems is solving novel problems. That’s where frameworks like scrum and agile come in– getting from the unknown to the known with a minimum of frustration and waste. Another challenge is performing known tasks correctly every […]