Resources
Cybersecurity white papers, data sheets, webinars, videos and more
Resource Library
March 26, 2026
RSAC 2026 Talk: Transforming Third-Party Risk Management From Compliance Checkboxes to Security Resilience
The traditional approach to managing supply chain risk is broken. For years, organizations have relied on annual questionnaires and static attestations to “check the box” for compliance. However, as SecurityScorecard CISO Steve Cobb highlighted in his RSAC 2026 talk, “The Outside-In Advantage: Modernizing TPRM with AI and Threat Intelligence,” 90%… Read More
March 24, 2026
SecurityScorecard and Dataminr Partner to Deliver Preemptive Cyber Defense for the Enterprise
Today, Dataminr and SecurityScorecard entered into a joint MOU to bring a new class of integrated cyber defense to enterprise and public sector organizations. By combining SecurityScorecard’s industry-leading AI-accelerated Third-Party Cyber Risk Management (TPRM) solutions with Dataminr’s newly launched Client-Tailored Threat Intelligence (CTTI), the partnership gives security teams something they’ve… Read More
February 25, 2026
What the Mississippi Ransomware Attack Means for Healthcare and How to Protect Critical Infrastructure
The ransomware attack that forced the closure of dozens of clinics across Mississippi is another stark reminder of how vulnerable critical infrastructure remains, especially in healthcare. When hospitals are pushed to paper records, appointments are canceled, and patient care is disrupted, cybersecurity stops… Read More
February 17, 2026
What Are the Real Security Risks of Agentic AI and OpenClaw?
For weeks, headlines have focused on AI agents seemingly organizing online and appearing to act independently, fueling speculation about artificial general intelligence (AGI). They’re not necessarily revolting or posting of their own accord, though. The agents are just doing what they were built… Read More
February 11, 2026
How Exposed OpenClaw Deployments Turn Agentic AI Into an Attack Surface
Public attention around OpenClaw has centered on dramatic narratives about autonomous AI agents coordinating independently or behaving unpredictably. SecurityScorecard’s STRIKE Threat Intelligence team identified the actual risk facing users and organizations alike in new research… Read More
February 10, 2026
Why India Is Emerging as a Third-Party Breach Hotspot
Over half of Indian vendors experienced at least one third-party breach in the past year, according to SecurityScorecard’s latest report on the cybersecurity posture of Indian suppliers. Vikram Bhatti, Major Accounts Director for India, and Adam Denyer-Hampton, Senior Director, Global Solutions Architect, examined how the findings… Read More
February 9, 2026
Strengthening National Cyber Resilience: Reflections from My Fireside Chat with ONCD Director Sean Cairncross
Last week, I had the privilege of hosting a fireside chat with Office of the National Cyber Director (ONCD) Director Sean Cairncross during SecurityScorecard’s exclusive briefing on strengthening the nation’s cyber resilience. The discussion brought together federal leaders, industry partners, and cybersecurity practitioners to explore how… Read More
February 9, 2026
Beyond the Hype: Moltbot’s Real Risk Is Exposed Infrastructure, Not AI Superintelligence
STRIKE Uncovers Widespread OpenClaw (Moltbot) Exposure Across the Internet Why are AI agents becoming a new attack surface? Over the past several days, OpenClaw (formerly known as Clawdbot and and Moltbot) has drawn intense attention across social media and headlines. Much of that attention has focused on… Read More
STRIKE Team
February 3, 2026
What Are Moltbot and Moltbook and What Happens When Agentic AI Assistants Scale Without Security
Moltbot, Moltbook, and the Real Risk Behind the AI Hype Moltbot, which offers users agentic artificial intelligence (AI) personal assistants, and its companion platform Moltbook have provided a useful case study over the last several days in how automation, poor… Read More
February 3, 2026
Recent Data Breach Examples
Every organization faces cyber threats, but studying real data breach examples reveals patterns that can help you strengthen your defenses. From stolen credentials and exposed data to ransomware attacks that cripple operations, these security incidents offer valuable lessons for security leaders. Our 2025… Read More
February 3, 2026
What is a SOC 2 Compliance Checklist?
For organizations handling customer data, achieving SOC 2 compliance has become a business requirement rather than a nice-to-have certification. Whether you’re a SaaS provider or any organization processing sensitive information, demonstrating your commitment to security through a SOC 2 audit builds trust with customers and partners alike. If… Read More
February 3, 2026
What Is a Brute Force Attack and How to Prevent It
Every day, attackers around the world attempt to break into systems using one of the oldest tricks in the hacking playbook. A brute force attack is exactly what it sounds like. An attacker systematically tries every possible combination of characters until they stumble upon the correct password or encryption key. Read More
February 3, 2026
What is a Parked Domain?
When you register a domain name through a domain registrar, you’re not always ready to build a website or email service right away. Maybe you’ve secured a valuable domain for future use, or you’re sitting on multiple domains as part of a broader brand protection strategy. This is where domain… Read More
February 3, 2026
What Is Cyber Incident Response and Why It Matters
Every organization will face a cybersecurity incident at some point. The question isn’t if a security event will occur, but when. And when that moment arrives, how your security teams respond can mean the difference between a contained threat and a catastrophic data breach. Cyber incident… Read More
February 3, 2026
What Is Network Cloud Security?
Most organizations have moved their critical workloads to the cloud. The network security approaches that worked on-premises didn’t make the trip. The traditional network perimeter, which once defined your security boundaries, no longer exists. Your data now flows across public cloud, private cloud, and hybrid cloud networks. Network… Read More
February 3, 2026
Odyssey 2026 Recap: Building Continuous Supply Chain Resilience in an Era of Persistent Threats
SecurityScorecard’s third annual Odyssey customer conference brought together nearly 300 CISOs, security operations leaders, and third-party risk management professionals in Miami on January 26-27. Despite East Coast snowstorms that grounded flights and forced last-minute rerouting, our customers from around the globe made the trip. Thank you!… Read More
January 22, 2026
Critical Update: What Security Leaders Need to Know Right Now About the Future of CISA and Threat Sharing
What Is CISA and Why Did Its Expiration Leave Cyber Defenses Exposed? Dr. Aleksandr Yampolskiy, CEO and Co-Founder of SecurityScorecard, sat down with Mike Centrella, former Assistant Director of the U.S. Secret Service and Head of Public Policy at SecurityScorecard, to discuss the expiration of the Cybersecurity Information… Read More
January 22, 2026
What is 5G Network Security?
The rollout of 5G networks represents one of the biggest shifts in wireless networking we’ve seen in decades. With promises of ultra-low latency, massive network capacity, and the ability to connect billions of Internet of Things devices, 5G is already powering everything from autonomous vehicles to smart cities. Read More
January 22, 2026
What is a CVE and Why is It Important?
Every day, security teams face an overwhelming challenge. Thousands of cybersecurity vulnerabilities emerge across software systems, networks, and applications. How do you identify which security threats demand immediate attention? How do you communicate risks when everyone speaks a different language about security issues? This is where… Read More
January 22, 2026
What Is Malware: Definition and Examples
Every day, organizations face an invisible enemy that can strike without warning. Malicious software has become one of the most pressing security concerns for businesses of all sizes. Understanding what malware is and how it operates is no longer just an IT concern. It’s a business imperative that… Read More