SecurityScorecard Blog
Read the latest blog posts published weekly.
-
Blog
‘The Perfect Scorecard’ Focuses on Communication Between CISOs and the Board
August 19, 2021The Perfect Scorecard: Getting an ‘A’ in Cybersecurity from your Board of Directors, is an attempt to close that gap. The Perfect Scorecard features insights from 17 leading CISOs and executives known for their leadership skills and their ability to communicate across roles and sectors.
More DetailsSecurity Ratings -
Blog, Learning Center
JBS Ransomware Attack Started in March and Much Larger in Scope than Previously Identified
June 8, 2021SecurityScorecard found that the JBS ransomware attack started in March and is much larger in scope than previously identified. Check out SecurityScorecard's research.
More DetailsCyber Threat Intelligence -
Blog
SecurityScorecard’s Board Trends Report Provides Actionable Insight
March 31, 2021An effective cybersecurity report needs to be quantifiable and should frame the risks as they pertain to the business’s goals, strategies, and risk tolerance.
More DetailsSecurity Ratings, Supply Chain Cyber Risk -
Blog, Learning Center
The Ultimate Data Breach Response Plan
March 24, 2021In a hyper-connected world, data breaches continue to increase in size and scope. To bolster your cybersecurity posture, you should put together a data breach response plan as a way to prepare your organization.
More DetailsServices, Tech Center -
Blog, Learning Center
How to Resolve Findings on Your SecurityScorecard Rating
March 16, 2021Understanding how to remediate and resolve SecurityScorecard security ratings findings can help you iterate your cybersecurity and compliance program for continued visibility into your risk posture. Find out more.
More DetailsSecurity Ratings -
Blog, Learning Center
34 Resources for Employee Cybersecurity Training
March 8, 2021Cybersecurity is a team effort. Check out these 34 resources for employee cybersecurity training.
More DetailsTech Center -
Blog, Learning Center
10 Examples of Recent and Impactful Ransomware Attacks
February 24, 2021With the cost of ransomware attacks growing, organizations must remain aware of the different ransomware variants used to compromise systems. Learn more about key ransomware threats
More DetailsCyber Threat Intelligence, Tech Center -
Blog, Learning Center
Healthcare IT Security and Compliance: A Complete Guide
August 26, 2020IT security and compliance are key for the healthcare industry as the adoption of web-based technologies and medical devices brings on new risks. Learn more.
More DetailsHealthcare, Services, Tech Center -
Blog
Calculating the ROI of Security Ratings.
August 24, 2020It can be difficult to show leadership metrics that prove that you’re saving money because of incidents that haven’t happened. Fortunately, there are a number of qualitative ways to prove to your board and investors that your investment in security ratings is saving your paying off.
More DetailsSecurity Ratings -
Blog, Learning Center
What Is a Cybersecurity Audit and Why Does it Matter?
August 17, 2020As organizations adopt new digital technologies, their risk of being targeted in cyberattacks grows. The increased network complexity that comes as a result of digital innovation often creates new network gaps for cyber adversaries to exploit. If left unchecked, these risks can undermine organizational objectives which is why it is critical that businesses have effective cybersecurity programs in place. A key component to the success of these programs is the administration of cybersecurity audits.
More DetailsTech Center -
Blog, Learning Center
What is a Third-Party Vendor? Tips for Managing Vendor Risk
July 23, 2020A third-party vendor is any company or entity with a direct written contract to provide goods or services to your customers on your behalf. Explore 3 best practices for third-party risk management.
More DetailsAttack Surface Management, Tech Center