Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Did you know that 75% of all data breaches involve a human element?

Every year, security budgets overlook the single biggest risk every organization faces: people. Technology and policies can’t stop a single bad click, but our new User Risk product gives security teams the visibility necessary to neutralize harmful activity before attackers can act. Purpose-built for today’s AI-driven threat landscape, User Risk finally gives teams a way to close the human gap in cybersecurity.

The Next Era of Cybersecurity Requires a New Approach...And a New Look

Cybersecurity teams have long faced an unfair fight against sophisticated digital threats with outdated TPRM, HRM, and ASM tools. It's time to change that. Our new logo and brand identity mark more than a refresh. They signal the next evolution of UpGuard. Every pixel reflects our vision for clarity in a complex world. And with the launch of the first cyber risk posture management platform, we're bringing that vision to life.

Fireside Chat | Adapting Security Leadership for the Age of AI

Erika Carrara, VP & Chief Information Security & Infrastructure Officer at The Greenbrier Companies, shares how she’s adapting her security strategy to meet the demands of the AI era by modernising her tech stack, implementing AI governance, and embedding security into business culture. Interested in finding out more about UpGuard?

What is Shadow SaaS? Causes, Risks, and Management Tips

Security teams are familiar with the comforting sense of safety that comes from utilizing security controls like Single sign-on (SSO) providers to manage their organization’s major applications and critical tools. When these applications are routed through Okta, Azure AD, or other identity providers, your SaaS environment can seem managed and accounted for. But lurking underneath is a significant vulnerability: the SSO blind spot.

CVE-2016-10033: Detection and Response Guide for 2025

Almost a decade after its discovery, the critical remote code execution vulnerability known as CVE-2016-10033 continues to pose a significant threat to web applications worldwide. In this post, we explain why it's so dangerous and the essential steps to protect your systems from this critical exposure in 2025.

The Mother of All Breaches: A Corporate Credential Security Wake-Up Call

Cybersecurity researchers uncovered what is being called the "mother of all breaches," a colossal dataset containing 16 billion login credentials, including user passwords for Google, Facebook, and Apple. To put that figure in context, the cache represents twice the current human population of the Earth. This event was not the result of a single breach, but likely a compilation of data stolen from multiple breaches over many years.

The User Risk Puzzle: Why Your Security Tools Don't Add Up

As a security leader, you face an inevitable daily reality: a flood of alerts pouring in from dozens of different tools. Risky sign-ins are flagged in Microsoft 365, weak passwords are pinged from a vault audit, and a separate report identifies which employees failed the latest phishing simulation. While all this information is valuable, most leaders are unable to connect these separate data points to paint a clear, cohesive picture of an individual user’s overall risk.