Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

November 2020

What Is Configuration Management and Why Is It Important?

Configuration management (CM) is a systems engineering process for establishing and maintaining consistency of a product's performance, functional, and physical attributes with its requirements, design, and operational information throughout its life. Configuration management is a form of IT service management (ITSM) as defined by ITIL that ensures the configuration of system resources, computer systems, servers and other assets are known, good and trusted. It's sometimes referred to as IT automation.

UpGuard November 2020 product releases and roadmap

Keynote address from our Chief Product Officer about this quarter's latest features, and a sneak peek into our February 2021 product launch. UpGuard's integrated risk platform combines third party security ratings, security assessment questionnaires, and threat intelligence capabilities to give businesses a full and comprehensive view of their risk surface. This quarter alone, UpGuard has released over 30 features to the UpGuard platform, including 6 major releases.

UpGuard Summit opening keynote: Security in 2020

UpGuard co-founder and co-CEO, Alan Sharp-Paul shares UpGuard’s journey in the complex year of 2020 and what the shift to remote work means from a security standpoint. UpGuard helps businesses manage cybersecurity risk. UpGuard's integrated risk platform combines third party security ratings, security assessment questionnaires, and threat intelligence capabilities to give businesses a full and comprehensive view of their risk surface.

What is clickjacking and how can I prevent it?

Cyber attackers are continuously cultivating their methods to evade detection. Now, they can cloak a seemingly innocuous webpage with an invisible layer containing malicious links. This method of attack, known as clickjacking, could cause you to activate your webcam or transfer money from your bank account. In this post, we outline the different types of clickjacking attacks and teach you how to best defend yourself against this application security threat.