Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

UpGuard

Remediation Requests within RIsk Assessments Demo with Senior Product Manager, Chris Schubert

Hear from UpGuard's Senior Product Manager, Chris Schubert, as he introduces you to UpGuard's new Remediation Requests within Risk Assessments feature. You can now also send remediation requests from within risk assessments, enabling you to track the progress of each item under remediation and have a record of the remediation request embedded directly into the point-in-time risk assessment.

Vendor Portfolios Demo with UpGuard's Product Marketing Lead, Harsh Budholiya

Learn from UpGuard's Product Marketing Lead, Harsh Budholiya, as he introduces you to UpGuard's new Vendor Portfolios feature. Vendor portfolios provide security teams greater control over user permissions by giving them the ability to define access to all or selected portfolios for each user on the platform based on their role in the organization.

Jira Integration Demo with UpGuard's Product Marketing Manager, Annie Luu

Hear from UpGuard's Product Marketing Manager, Annie Luu, as she introduces you to UpGuard's new Jira Integration feature. UpGuard's Jira integration plugs directly into your workflow management, giving you the flexibility to present only the information you want to the relevant people to address security risks promptly. =========== CHAPTERS:=========== Interested in finding out more about UpGuard?

Your Password Was Exposed in a Non-Google Data Breach: How to Respond

If you’re a Google Chrome user, you may have received the pop-up alert “Your password was exposed in a non-Google data breach” in your web browser. The alert informs users of any recent security breaches which may have compromised their account passwords. Read on to learn more about what this alert means for your data security and the appropriate steps to secure your personal data.

What is TTP Hunting?

TTP hunting is an intelligence-based type of cyber threat hunting that analyzes the latest TTP (Tactics, Techniques, and Procedures) used by hackers and cybercriminals. TTP threat hunters study the newest tools and technologies used by cybercriminals, learn how to detect new attack trends, and gather enough cyber threat intelligence so that companies can fully protect their attack surface.

Sumo Logic vs Splunk: Which Is Better For Big Data Log Analysis?

Log analysis and security incident and event management (SIEM) tools have become staples of enterprise cyber resilience programs. For vigilant organizations, having infrastructure visibility into the transactions occurring behind the scenes is instrumental to maintaining a strong security posture. Splunk and SumoLogic are two leading platforms that serve this critical purpose—let’s revisit them again to see how their current offerings stack up.

This Password Has Appeared in a Data Leak: How to Respond

“This password has appeared in a data leak, putting this account at high risk of compromise. You should change your password immediately” – if you own an iPhone or iPad running on iOS 14 or above, you may have received this worrying message lately. Apple rolled out this feature across both devices and Macs as a cybersecurity feature. If you have received this notification, you might be wondering what it means and what to do next. Read on to learn more.

Can SIM Cards Get Hacked?

‍Yes, even basic technology like SIM cards poses the risk of getting hacked. Today, cell phones have almost become tiny supercomputers, so users must learn how to secure their mobile phones. From social engineering scams to SIM hijacking, sensitive data can easily become compromised without adequate cybersecurity awareness. Learn more about why SIM card hacking is on the rise and how you can prevent it from happening.