Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ThreatBook Selected in the First-ever Gartner® Magic Quadrant for Network Detection and Response (NDR)

After nearly a year of research and evaluation, Gartner released the first "Magic Quadrant for Network Detection and Response" report on May 29, ThreatBook became the only Chinese company selected.

Beyond Compliance: How Cyber Threat Intelligence Fortifies Third-Party Risk Management

Third-Party Risk Management (TPRM) is a critical function for modern organizations, given the reliance on external vendors and partners. The interconnectedness of digital ecosystems means that a breach at a third party can have severe repercussions for your organization. In a recent Dark Reading survey, 30% of organizations experienced some or many supply chain attacks over the past 12 months, and only 14% of respondents reported themselves confident their supply chain is completely secure.

Shadow AI: Managing the Security Risks of Unsanctioned AI Tools

The explosion of generative artificial intelligence tools is sparking a wave of enthusiasm in workplaces, with employees eagerly embracing new applications to boost productivity and innovation. However, this adoption often leads to a new phenomenon known as shadow AI—the use of artificial intelligence tools within an organization without explicit approval or oversight from IT and security teams. Unsanctioned use of AI creates significant (and often invisible) security blind spots.

Data Leakage and Other Risks of Insecure LlamaIndex Apps

Similar to Ollama and llama.cpp, LlamaIndex provides an application layer for connecting your data to LLMs and interacting with it through a chat interface. While LlamaIndex is an open source project like other LLM application frameworks, LlamaIndex is also a company, with a recent Series A, a commercial offering, and a more polished aesthetic than their strictly DIY counterparts.

BlueVoyant Unveils New SBOM Capabilities as Part of Its Leading Third-Party Cyber Risk Management Solution

BlueVoyant's new Software Bill of Materials (SBOM) management offering, powered by SBOM leader Manifest, enables organisations to efficiently analyse and reduce third-party risks from commercial software.

Inside RansomHub: Tactics, Targets, and What It Means for You

Ransomware attacks are undeniably on the rise—but just how significant is the increase? According to Bitsight CTI researchers, ransomware attacks (as measured by unique victims listed on leak sites) rose by almost 25% in 2024, and the number of ransomware group leak sites rose by 53%. Ransomware is becoming the go-to tactic for financially driven threat actors seeking quick and substantial payouts.

The Power of Automated Risk Resolution: Simplifying Security for Your Team

In today’s cybersecurity landscape, security teams face a daunting challenge: managing an ever-growing volume of risks with limited time and resources. Traditional manual risk resolution methods are no longer sufficient. They slow down response times, increase the risk of human error, and strain already stretched teams—ultimately compromising the organization’s security posture. That’s where automated risk resolution comes in.

Building cybersecurity resilience through governance and assurance

Notis Iliopoulos from Obrela explains why it is time to move beyond checkbox compliance towards true operational resilience and provides advice on how to do it Managing cybersecurity risk exposure and ensuring compliance with evolving regulations has never been more complex or more critical. The rapid expansion of regulatory frameworks such as NIS2, DORA, and GDPR, to name a few, has forced organisations to rethink their approach to governance, risk and compliance (GRC).

Is Runtime Vulnerability Management the future of cyber risk management?

Traditional vulnerability management has hit a wall. The vulnerability management playbook hasn't changed much in decades: scan for CVEs, prioritize by CVSS scores and patch as quickly as possible. But this reactive approach is failing security teams who are drowning in alerts while real threats slip through the cracks. Runtime vulnerability management sets out to change this status quo. Here's what you need to know.

Smarter Security Assessments: Automate, Customize, Scale

Discover how AI is transforming third-party risk management. In this update, Michelle from our Customer Success team walks through key improvements to AI-Assessments—from instant Security Profiles and smarter questionnaires to faster reporting and risk remediation. See what’s live, what’s coming next, and how your feedback is shaping the future of vendor risk. Interested in finding out more about UpGuard?