Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Risk Management

Featured Post

Four Takeaways as the European Union's General Data Protection Regulation (GDPR) Turns 4

May 25 2022, marked four years since the European Union's General Data Protection Regulation (GDPR) went into effect. Although the scope of the law is limited to personal data originating from activities in the European Economic Area, the ensuing requirements have had a global impact. This is evident in similar laws that have been proposed or passed and measures multinational organizations have taken to comply with privacy requirements. In parallel, there has been a convergence of a principles' based approach to cybersecurity in many jurisdictions worldwide.

KillNet Utilizes CC-Attack: A Quick & Dirty DDoS Method

During the course of 2022, SecurityScorecard has been tracking multiple DDoS campaigns that have been targeting entities within the Ukrainian government, as well as other European government targets that are perceived to be allied with Ukraine government interests. One of the groups at the forefront of these DDoS attacks is the hacking collective known as KillNet.

5 Ways to Effectively Prevent Data Leakage

Nowadays, it’s common to hear about yet another high-profile security breach in which critical data is leaked, resulting in damage to the organization’s reputation and bottom line. Unfortunately, it's impossible to remove all risks in your organization but there are ways to best protect against them and improve your security posture.

Remediation Requests within RIsk Assessments Demo with Senior Product Manager, Chris Schubert

Hear from UpGuard's Senior Product Manager, Chris Schubert, as he introduces you to UpGuard's new Remediation Requests within Risk Assessments feature. You can now also send remediation requests from within risk assessments, enabling you to track the progress of each item under remediation and have a record of the remediation request embedded directly into the point-in-time risk assessment.

Vendor Portfolios Demo with UpGuard's Product Marketing Lead, Harsh Budholiya

Learn from UpGuard's Product Marketing Lead, Harsh Budholiya, as he introduces you to UpGuard's new Vendor Portfolios feature. Vendor portfolios provide security teams greater control over user permissions by giving them the ability to define access to all or selected portfolios for each user on the platform based on their role in the organization.

Jira Integration Demo with UpGuard's Product Marketing Manager, Annie Luu

Hear from UpGuard's Product Marketing Manager, Annie Luu, as she introduces you to UpGuard's new Jira Integration feature. UpGuard's Jira integration plugs directly into your workflow management, giving you the flexibility to present only the information you want to the relevant people to address security risks promptly. =========== CHAPTERS:=========== Interested in finding out more about UpGuard?

How to Use Cyber Assurance Programs to Manage Risk Based on Business Outcomes

If you’ve been following any of our recent webinars or in-person presentations, you’ve heard us talk a lot about shifting the mindset from a focus on compliance to a risk-first approach. We’ve discussed that the best way to do this is to align your risk management program to specific outcomes, where compliance becomes a subset of your risk management program. But what does that mean specifically? And what are some examples of how this can be done?

CISO Insights: The Power of Risk Intelligence

In today’s digitally-connected world, cyber risk is no longer a matter of probabilities, but certainties. This requires CISOs to rethink their reactive risk management program by evolving to embrace a proactive risk intelligence approach. With a risk intelligence-informed program, CISOs and their teams can continuously collect insights in a way that enables proactive, holistic, and data-driven decisions about security.

Creating a Vendor Risk Management Framework

Global third-party suppliers have become an essential resource for many companies, providing crucial strategic and competitive support. Outsourcing, however, is not without its dangers. As dependency on third parties grows, so do the chances of supply chain, compliance, or reputation risks that hit your organization through those third parties. Your management team will need to address those risks somehow.