Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

How Can You Defend Against Corporate Espionage in a Hyperconnected World?

May 14, 2025

How Can You Defend Against Corporate Espionage in a Hyperconnected World?
Corporate espionage is a growing cyber threat. Learn the tools, tactics, and best practices to protect your intellectual property and strategic advantage.
What Is UPnP and Why Is It a Security Risk?

May 14, 2025

What Is UPnP and Why Is It a Security Risk?
Universal Plug and Play simplifies connectivity—but it also introduces serious vulnerabilities. Discover what UPnP is, the risks, and how to disable it securely.
What Does a Data Breach Cost? Key Insights for Cyber Leaders

May 13, 2025

What Does a Data Breach Cost? Key Insights for Cyber Leaders
Data breach costs increased in 2024. Explore the direct and hidden costs of cyber incidents and how to reduce your organization’s exposure.
What Are Proxy Browsers? How Cybercriminals Use Them In Attacks

May 13, 2025

What Are Proxy Browsers? How Cybercriminals Use Them In Attacks
Learn how proxy browsers enable cybercriminals to disguise their origins, bypass security, and conduct attacks. Explore how to detect and defend against proxy browser misuse.
What Happens When HTTPS Is Misconfigured? Common Risks and How to Fix Them

May 12, 2025

What Happens When HTTPS Is Misconfigured? Common Risks and How to Fix Them
HTTPS misconfigurations, like expired certificates or HSTS errors, create serious security risks. Learn the most common issues and how to fix them quickly to protect your web assets.
Cybersecurity
How Do You Use the SIG Questionnaire for Better Third-Party Risk Assessment?

May 12, 2025

How Do You Use the SIG Questionnaire for Better Third-Party Risk Assessment?
Learn how to use the SIG Questionnaire to accelerate vendor risk assessments, align with compliance frameworks, and reduce third-party cyber risk.
Tech Center
Top Free Network-Based Intrusion Detection Systems for Modern Enterprises

May 9, 2025

Top Free Network-Based Intrusion Detection Systems for Modern Enterprises
Free and open-source network intrusion detection systems (NIDS) can enhance visibility and threat detection.
What Is PII? How to Protect Personally Identifiable Information in 2025

May 8, 2025

What Is PII? How to Protect Personally Identifiable Information in 2025
Personally identifiable information (PII) remains a prime target for threat actors. Learn what qualifies as PII in 2025—and how to defend it.\r\n
Guide to Developing a Business Continuity Plan

May 8, 2025

Guide to Developing a Business Continuity Plan
Explore business continuity in cybersecurity. Learn how a continuity plan helps assess threats, reduce risk, and protect operations from attacks.
Safeguarding Against Subdomain Takeover

May 8, 2025

Safeguarding Against Subdomain Takeover
Learn what subdomain takeover is and how to prevent it with best practices and continuous monitoring.
What Is a Supply Chain Attack?

May 8, 2025

What Is a Supply Chain Attack?
Learn how a supply chain attack works, why it’s so dangerous, and what security measures can help protect your organization from hidden threats.
Supply Chain Cyber Risk
Threat-Informed TPRM
What Is a Cyber Threat? What Risk Leaders Need to Know

May 7, 2025

What Is a Cyber Threat? What Risk Leaders Need to Know
Learn what cyber threats are, how they work, and why recognizing them is essential to reducing organizational risk.\r\n
Assembling the Dream Team: Building a High-Performing Supply Chain Incident Response Team

May 6, 2025

Assembling the Dream Team: Building a High-Performing Supply Chain Incident Response Team
This article explores the key elements of building a high-performing supply chain incident response team to effectively mitigate and respond to these threats.
Threat-Informed TPRM
Scorecarder Spotlight: Chandra Sekhar Betha

May 5, 2025

Scorecarder Spotlight: Chandra Sekhar Betha
Our “Scorecarder Learning & Development Spotlight” series showcases our talented, driven employees, the incredible work they do, and their quest to continue their development as lifelong learners.
Scorecarder Spotlight
How Do You Back Up Business-Critical Data?

May 2, 2025

How Do You Back Up Business-Critical Data?
Building a Reliable Backup Strategy Against Cyberattacks and Disruptions Using Best Practices for Cyber Resilience
Enterprise Cyber Risk
MAX
Third-Party Risk Management
What Do You Do If Your Password Appears in a Data Leak?

May 1, 2025

What Do You Do If Your Password Appears in a Data Leak?
7 Steps to Secure Your Digital Life After a Password Breach
Enterprise Cyber Risk
GRC
Phishing
What Is a Proxy Server? Understanding Security Risks and Corporate Use Cases

April 30, 2025

What Is a Proxy Server? Understanding Security Risks and Corporate Use Cases
How Proxy Servers Work and Why They Matter in Enterprise Security
Third-Party Risk Management
Threat-Informed TPRM
Fines, Jail Time, and Criminal Charges for DDoS Attacks

April 29, 2025

Fines, Jail Time, and Criminal Charges for DDoS Attacks
Fines, Are DDoS Attacks Illegal? Find out the laws and penalties in this blog.
Security Ratings
Supply Chain Cyber Risk
Third-Party Risk Management
5 Lessons from the Optus Data Breach for Telecom and Third-Party Risk

April 24, 2025

5 Lessons from the Optus Data Breach for Telecom and Third-Party Risk
Explore the impact of the Optus data breach and why CISOs must rethink third-party and telecom security in today’s interconnected threat landscape.
Enterprise Cyber Risk
GRC
Third-Party Risk Management
2025 Top 20 Must Read Resources to Stay Updated on Cybersecurity Threats and Trends

April 23, 2025

2025 Top 20 Must Read Resources to Stay Updated on Cybersecurity Threats and Trends
Cut through the noise with expert-trusted cybersecurity resources designed to inform, protect, and empower enterprise security leaders.
Cyber Threat Intelligence
GRC
Third-Party Risk Management
SOX Compliance Checklist: What Security Teams Need to Know in 2025

April 22, 2025

SOX Compliance Checklist: What Security Teams Need to Know in 2025
Explore our 2025 SOX compliance checklist for cybersecurity leaders. Learn key requirements, reporting timelines, and how to secure third-party risk.
Enterprise Cyber Risk
GRC
Third-Party Risk Management