
Learning Center
Learn more about the industry and SecurityScorecard.
-
Learning Center
What is Mobile Forensics? Definition, Processes, & Examples
June 30, 2025More DetailsTech Center -
Learning Center
What is Continuous Cybersecurity Monitoring?
June 30, 2025Recommended: Cybersecurity monitoring is a threat detection strategy that uses automation to continuously scan your IT ecosystem for control weaknesses. Learn more.
More DetailsTech Center -
Learning Center
What Is a Cybersecurity Vendor Due Diligence Questionnaire?
June 30, 2025A vendor cybersecurity due diligence questionnaire is a written assessment given to a vendor to gain a better understanding of their cybersecurity environment.
More DetailsTech Center -
Learning Center
What is Cybersecurity Analytics? Definition & Use Cases
June 30, 2025Cybersecurity analytics is an approach that uses data aggregation, attribution, and analysis to extract the information needed for proactive cybersecurity. Explore benefits and use cases.
More DetailsSecurity Ratings, Tech Center -
Learning Center
What is Domain Hijacking and How Do I Prevent it?
June 30, 2025Your domain name is not just a web address; it represents your brand, your reputation, and often, your livelihood. However, with the increasing value of domain names, they have become targets for cybercriminals seeking to exploit vulnerabilities for their gain. One such threat is domain hijacking – a serious issue that can have significant repercussions if not addressed promptly. Here, we'll delve into what domain hijacking entails and explore practical steps to prevent it from happening to you.
More DetailsTech Center -
Learning Center
10 Cybersecurity Criteria for Smarter Vendor Selection
June 27, 2025Learn the 10 most critical cybersecurity criteria to include in your vendor selection process. Make smarter, risk-informed decisions before onboarding third parties.
More Details -
Learning Center
What is the Difference Between IT Risk Management and Cybersecurity?
June 25, 2025Explore how IT risk management and cybersecurity differ—and where they overlap. Learn how to align both for a stronger, more resilient organization.
More Details -
Learning Center
Building a Vendor Risk Management Program: Strategies for Success
June 24, 2025Learn how to build a vendor risk management (VRM) program that aligns with modern cyber threats. Discover essential steps, tools, and continuous monitoring strategies for supply chain protection.
More Details -
Blog, Learning Center, STRIKE
Unmasking A New China-Linked Covert ORB Network: Inside the LapDogs Campaign
June 23, 2025SecurityScorecard’s STRIKE team uncovered a new China-Nexus ORB Network targeting the United States and Southeast Asia. Read the report to gain an in-depth look at the LapDogs ORB network, its custom malware, and its role in cyberespionage.
More DetailsSTRIKE Team -
Learning Center
Understanding Third-Party Risk: Identifying and Mitigating External Threats
June 23, 2025Learn how to identify, assess, and mitigate third-party cybersecurity risks. Discover the most common vulnerabilities, threat actor behavior, and how to monitor threats in 2025.
More Details -
Learning Center
What Is FIPS 140-3 and Why Does It Matter for Security Compliance?
June 23, 2025Learn what FIPS 140-3 certification entails, why it’s critical for federal and industry cybersecurity compliance, and how to ensure your cryptographic modules meet the standard.
More Details -
Learning Center
What Does the Gramm-Leach-Bliley Act (GLBA) Require?
June 20, 2025Learn the core requirements of the Gramm-Leach-Bliley Act (GLBA), including the Safeguards Rule, privacy notices, and cybersecurity responsibilities for financial institutions.
More Details