
SecurityScorecard Blog
Read the latest blog posts published weekly.
-
Blog
Automating Vendor Risk Management and Assessments
March 18, 2025Automated vendor risk assessments provide visibility into third-party vendors’ cybersecurity and enhance the third-party risk management process. Learn more.
More Details -
Blog
The Principles for Fair & Accurate Security Ratings: A Focus on Confidentiality
March 11, 2025Our Security ratings align with the Principles for Fair & Accurate Security Ratings, published by the US Chamber of Commerce. As part of this effort we strive to educate the cybersecurity community on how our products align with these important principles.
More Details -
Blog
Scorecarder Spotlight: Luciano Bargmann
March 5, 2025Our series “Scorecarder Spotlight” showcases our talented employees and the incredible work they do. Meet Luciano Bargmann!
More DetailsScorecarder Spotlight -
Blog
3 Tangible Benefits of an A Rating
March 4, 2025Security ratings are a standard in cybersecurity. Many organizations rely on them to manage their security programs and they create ROI for the organization. Despite the potential benefits, it can be challenging for organizations who are evaluating different security ratings options to determine the value they will get from them.
More Details -
Blog
From Reactive to Resilient: A New Mindset for Supply Chain Cybersecurity
March 4, 2025Key takeaways from a recent webinar featuring SecurityScorecard CISO, Steve Cobb, on how organizations can strengthen their cyber resilience in the face of evolving threats.
More DetailsSCDR -
Blog
Odyssey.conf 2025: Charting the Course for Cyber Resilience
March 4, 2025Last week, SecurityScorecard hosted our second annual Odyssey.conf in Miami, Florida. This year's conference focused on cyber resilience, providing attendees with actionable insights and cutting-edge strategies to navigate the ever-evolving threat landscape.
More DetailsSCDR -
Blog
Understanding the Third Party Risk Management Lifecycle
February 25, 2025Many enterprises have reported some sort of harm resulting from a third-party vendor but learning how to understand the third-party risk management cycle can help you map out and ensure you’re taking a best-practice, holistic approach to manage your ecosystem.
More Details -
Blog
Third-Party Risk Management Regulations: What You Should Know
February 18, 2025Third-party risk management regulations may seem like red tape nuisance at first, but these regulations ultimately reduce your organization’s risk as well. Learn more.
More Details -
Blog, Learning Center
Vendor Risk Assessment Template
February 13, 2025You can’t completely eliminate vendor risk, but you can manage it. Learn how to create a vendor risk assessment template with SecurityScorecard.
More DetailsTech Center -
Blog, Learning Center
The Ultimate Data Breach Response Plan
February 13, 2025In a hyper-connected world, data breaches continue to increase in size and scope. To bolster your cybersecurity posture, you should put together a data breach response plan as a way to prepare your organization.
More DetailsServices, Tech Center -
Blog
Lazarus Group Targets Developers Through NPM Packages and Supply Chain Attacks
February 13, 2025North Korea’s Lazarus Group is evolving its tactics again. The latest campaign, dubbed Operation Marstech Mayhem, introduces an advanced implant named "Marstech1."
More DetailsSTRIKE Team -
Blog
A Deep Peek at DeepSeek
February 10, 2025DeepSeek’s rapid ascent in the AI space has made it impossible to ignore. Its sophisticated models and AI assistant have captured global attention. And, while headlines focus on DeepSeek’s capabilities, STRIKE research exposes critical security flaws, hidden data flows, and unanswered questions about who has access to the data and why.
More DetailsSTRIKE Team