Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Is your TPRM program an engine or an anchor?

In 2026, a slow assessment is a security risk. Every day spent in manual handoffs is a day of exposure for your organization. Join us at UpGuard Summit to see how our new Risk Automations engine transforms TPRM from a static checklist into an autonomous system. We will show you how to automate everything from vendor follow-ups to instant Jira routing for IT and Legal.

1 in 15 MCP Servers are Lookalikes: Is Your Org at Risk?

Researchers recently analyzed 18,000 Claude Code configuration files pulled from public GitHub repositories. What they found was straightforward and alarming: developers are already installing mistyped, misconfigured, and near-identical MCP server names — often without realizing it. The human-error condition that makes typosquatting work was already present at scale before any attacker needed to exploit it.

The Shadow Supply Chain: A Pivot To Usage-Based Discovery

We’ve established the new forensic reality: a massive 72.9% inventory gap exists between the vendors you monitor and those invisible to your security. We have seen the shortcomings of SSO and its inability to holistically monitor all the vendor applications your users engage with, along with a Shadow AI explosion that is compounding both issues. The era of procurement-only discovery is over. To secure the modern cyber workforce, we must pivot from "buying-based" to usage-based discovery.

MCP: The AI Protocol Quietly Expanding Your Attack Surface

In February 2026, researchers uncovered something that should give every security leader pause. A malware operation called SmartLoader, previously known for targeting consumers who downloaded pirated software, had completely pivoted its infrastructure. SmartLoaders new target was developers, and its new entry point was a protocol most security teams had never heard of. The payload delivered to victims: every saved browser password, every cloud session token, every SSH key on the machine.

Exploited Before CISA KEV: What 8 Confirmed Cases Reveal

Most vulnerability programs are built to act when risk looks obvious, such as when a vulnerability lands in CISA KEV, a public exploit emerges, or EPSS rises. This approach is rational because it provides a clear, defensible trigger for action. But it often comes with delay: by the time signals are strong enough to drive consensus, the window to get ahead of risk may already be closing.

Beyond Detection: What a National Cyber Drill Reveals About True Cyber Resilience

In today’s threat landscape, cybersecurity is no longer defined by the ability to detect and respond to isolated incidents. It is defined by how organizations perform under pressure, when faced with coordinated, AI-enabled, multi-vector attacks that test not only technology, but leadership, governance, and trust. Recently, Obrela had the opportunity to support a national-level cyber security drill in Qatar, working alongside our partner ecosystem.

Is Your Official Vendor List a Lie?

How many new vendors did your team engage with today? If you’re looking at your official procurement list, the answer might be zero. But if you’re looking at employee behavior, the reality is likely much higher. Find out more about the shadow supply chain in our most recent research report: Interested in finding out more about UpGuard?

Measuring Real Risk Reduction Across Your Security Stack

Garrett Hamilton recently presented at the North Texas ISSA Lunch & Learn in Plano, TX to talk about what risk reduction actually looks like in practice. Reach shows customers exactly which controls they've deployed, the user impact of those changes, and how much risk has been reduced across IAM, EDR, email, firewall, and SASE. Not feature checklists. Targeted, measurable outcomes tied to the business.

SecurityScorecard Weekly Brief: The Cyber Risk and Policy Edition - Amanda Smith

In this week’s Weekly Brief: The Cyber Risk and Policy Edition, SecurityScorecard’s Director, Public Sector Channel Amanda Smith breaks down why the U.S. war with Iran is more than just what takes place on the physical battlefront. In 2026, as conflict unfolds in the Middle East, the digital battlefield has a direct impact on the homeland and U.S. critical infrastructure, too. “It's a global digital confrontation that hits a lot closer to home than a lot of people realize.”

An Introduction to the NIST Risk Management Framework (RMF)

While inherently critical to today’s businesses that run on data, implementing and enforcing data security and privacy has never been straightforward. Between collecting different types of sensitive data and deploying unique architectures, organizations cannot adopt a one-size-fits-all solution, meaning that every security architecture is unique.