UpGuard

Check your Amazon S3 permissions. Someone will.

This post was originally published here by UpGuard. Nearly all large enterprises use the cloud to host servers, services, or data. Cloud hosted storage, like Amazon’s S3, provides operational advantages over traditional computing that allow resources to be automatically distributed across robust and geographically varied servers. However, the cloud is part of the internet, and […]

Assessing Critical Cyber Risks with UpGuard

This post was originally published here by Greg Pollock. Given the complexity of modern information technology, assessing cyber risk can quickly become overwhelming. One of the most pragmatic guides comes from the Center for Internet Security (CIS). While CIS provides a comprehensive list of twenty controls, they also provide guidance on the critical steps that “eliminate […]

5 Biggest Takeaways From WannaCry Ransomware

This post was originally published here. Global in scale, with across the board press coverage, the WannaCry ransomware attack has quickly gained a reputation as one of the worst cyber incidents in recent memory. Despite the scale, this attack relied on the same tried and true methods as other successful malware: find exposed ports on the Internet, […]

Data Crunch: Stats or Scoreboards?

This post was originally published here . When it comes to measuring success for your team, finding a reliable and accurate means for doing so can be more difficult than it might appear. UpGuard’s VP of Product, Greg Pollock, wrote about his insights into instituting such metrics and understanding the difference between “behavior” and “results.” […]

WHAT YOU NEED TO KNOW ABOUT THE CLOUDBLEED BUG

This post was originally published here. On February 18th, 2017, Google security researchers discovered a massive leak in Cloudflare’s services that resulted in the exposure of sensitive data belonging to thousands of its customers. Here’s what you need to know about the Cloudbleed bug and what can be done to protect your data. Background Cloudflare is […]

Which Fast Food Chain is Next in Line to Get Hacked?

This post was originally published here by . Arby’s announced last week that its recently disclosed data breach may impact 355,000 credit card holders that dined at its restaurants between October 2016 and January 2017. Are fast food vendors resilient enough to sustain future cyber attacks and—more importantly—protect consumers against online threats? Like recent data breaches […]

How Cyber Resilient Are The Top Online Banks?

This post was originally published here. Booksellers and electronics retailers aren’t the only brick-and-mortar businesses challenged by the rise of highly agile, online-only competitors—traditional retail banking institutions also face stiff competition from Internet-based consumer banking upstarts. But are these born-in-the-cloud banks and financial services offerings safer than their traditional counterparts? Let’s take a look at the […]

SHORTEN YOUR DETECTION CYCLE WITH UPGUARD’S EVENTS SYSTEM

This post was originally published here. UpGuard’s Events systems provides a communication hub to send the data that UpGuard gathers to external systems. Integration between technologies is critical to high performing digital businesses, and UpGuard’s Events system provides a simple way to get the information you need the places where you need it. “When those […]

How Secure Are the Leading Travel Aggregator Websites?

AAA predicts that a record number of Americans will be taking to the skies and roads this holiday season—103 million between Dec. 23-Jan. 2, a 1.5% increase over 2015. 57% of these travel reservations—that’s 148 million travellers—booked online. Airfare/hotel/car rental comparison websites are an increasingly popular way to book travel these days, but how good are they at protecting their users’ data? […]

Vulnerabilities vs Misconfigurations

Vulnerability assessment is a necessary component of any complete security toolchain, and the most obvious place to start for anyone looking to improve their security. Ironically, starting with vulnerability assessment can actually degrade an organization’s overall defense by shifting focus from the cause of most outages and breaches: misconfigurations.   Misconfigurations – Not Very Cool, […]

UpGuard is the only platform that provides CSTAR, the CyberSecurity Threat Assessment Report. CSTAR looks at your infrastructure from the inside-out and provides an easy-to-understand risk score which insurers can use in determining a fair premium for cybersecurity insurance. Our customers use UpGuard to accelerate DevOps initiatives, identify critical security gaps and vulnerabilities, streamline auditing and compliance testing, and gain visibility into the true state of their infrastructure.
Share this page