In our first Insight Session, our Senior Product Manager Lisa Baldacchino will talk you through the practices on how to set up and optimize your vendor risk management program.
In our third Insight Session, our VP of BreachSight Greg Pollock will talk through how to get started with an Attack Surface Management Program, understand what it means to protect your attack surface, why you should invest in it, and the steps to take that will quickly show a return on investment.
In our second Insight Session, our Senior Product Manager Jess Hooper will teach you how to improve your vendor relationships by shifting your processes from reactive to proactive,using UpGuard’s powerful suite of vendor tools.
Join UpGuard's Chief Product Officer, Dan Bradbury, as he shines a spotlight on all of the groundbreaking product releases from the last quarter and the exciting releases coming soon.
This short video explains how Salt Labs researchers identified several critical security flaws on the popular travel site Booking.com. The flaws were found in the site's authentication functionality and could have allowed a malicious attacker to take over user accounts, access profile information, and take actions on behalf of the user such as booking or canceling reservations and ordering transportation services.
Building JavaScript applications today means that we take a step further from writing code. We use open-source dependencies, create a Dockerfile to deploy containers to the cloud, and orchestrate this infrastructure with Kubernetes. Welcome - you're a cloud native application developer! As developers, our responsibility has broadened, and more software means more software security concerns for us to address.
Our research shows that 48% of security leaders are worried about a cloud breach, and they have reason to worry if their cloud security isn’t ready for potential threats. Join us for a LinkedIn Live as we dig into the data from our “Global Uncertainty” survey and offer up next steps for organizations to ease their cybersecurity concerns and start securing their systems.
What makes a company successful at breach response? In a word, preparation. In this episode, Troy breaks down an historically bad example of breach response, and how to avoid a similar fate. Hello CISO is a collaboration between Troy Hunt and the people who build the world's most trusted enterprise password manager.
Lookout Mobile Endpoint Security allows organizations to protect data and government agencies to comply with state and federal government mandates, such as OMB M-23-13, banning the use of TikTok on devices.