Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Is your TPRM program an engine or an anchor?

In 2026, a slow assessment is a security risk. Every day spent in manual handoffs is a day of exposure for your organization. Join us at UpGuard Summit to see how our new Risk Automations engine transforms TPRM from a static checklist into an autonomous system. We will show you how to automate everything from vendor follow-ups to instant Jira routing for IT and Legal.

1 in 15 MCP Servers are Lookalikes: Is Your Org at Risk?

Researchers recently analyzed 18,000 Claude Code configuration files pulled from public GitHub repositories. What they found was straightforward and alarming: developers are already installing mistyped, misconfigured, and near-identical MCP server names — often without realizing it. The human-error condition that makes typosquatting work was already present at scale before any attacker needed to exploit it.

The Shadow Supply Chain: A Pivot To Usage-Based Discovery

We’ve established the new forensic reality: a massive 72.9% inventory gap exists between the vendors you monitor and those invisible to your security. We have seen the shortcomings of SSO and its inability to holistically monitor all the vendor applications your users engage with, along with a Shadow AI explosion that is compounding both issues. The era of procurement-only discovery is over. To secure the modern cyber workforce, we must pivot from "buying-based" to usage-based discovery.

MCP: The AI Protocol Quietly Expanding Your Attack Surface

In February 2026, researchers uncovered something that should give every security leader pause. A malware operation called SmartLoader, previously known for targeting consumers who downloaded pirated software, had completely pivoted its infrastructure. SmartLoaders new target was developers, and its new entry point was a protocol most security teams had never heard of. The payload delivered to victims: every saved browser password, every cloud session token, every SSH key on the machine.

Is Your Official Vendor List a Lie?

How many new vendors did your team engage with today? If you’re looking at your official procurement list, the answer might be zero. But if you’re looking at employee behavior, the reality is likely much higher. Find out more about the shadow supply chain in our most recent research report: Interested in finding out more about UpGuard?

What is Shadow IT?

Shadow IT refers to any technology—including hardware, software, cloud services, SaaS applications, or AI tools—used within an organization without the explicit approval of the IT or security department. Shadow IT is rarely malicious. It is usually the result of employees searching for a means of making their workflows more efficient. When sanctioned corporate tools are perceived as too slow, rigid, or complex, users often "self-serve" by adopting unvetted alternatives to meet their deadlines.

The Context Gap: How Nearly Half of Your Time is Lost to Investigation

The classic tradeoff in cybersecurity has always been simple: more visibility at the cost of speed. But today, that tradeoff is breaking down. As attackers leverage AI to find and exploit vulnerabilities at unprecedented scale, the sheer volume of alerts is burying security teams. The result? An expanding exposure gap. It is taking longer than ever to triage and remediate threats, creating a dangerous window between when a tool pings and when a human in the SOC can actually take action.

The Vendor Tiering Series: Tiering that Scales

There’s no way to stop the clock in cybersecurity for InfoSec teams, but you can find ways to manufacture a better way to spend their time. Tiering does just that, prioritizing your team’s most finite resource. But to start, you need better data, and most importantly, better logic to redefine how you work.