SecurityScorecard Blog
Read the latest blog posts published weekly.
-
Blog
KillNet Utilizes CC-Attack: A Quick & Dirty DDoS Method
May 25, 2022SecurityScorecard's analysis of CC-Attack reveals the script automates the process of using open proxy servers to relay attacks.
More DetailsCyber Threat Intelligence -
Blog, Learning Center
Understanding the Basics of Cyber Insurance: What You Need to Know
March 7, 2022Learn more about the basics of cyber insurance and how it can -- and can't -- help your organization recover from a cyber incident.
More DetailsCyber Insurance, Tech Center -
Blog, Learning Center
First-Party vs Third-Party Cyber Insurance: What’s the Difference?
December 6, 2021First-party and third-party cyber insurance work to protect your business from serious financial and reputational damage that may result from a data breach. Learn more.
More DetailsCyber Insurance, Tech Center -
Blog, Learning Center
The Evolution of Cybersecurity Solutions and Threats
October 25, 2021To know where cybersecurity solutions are headed, we must know where they came from. Learn more about the evolution of cybersecurity solutions.
More DetailsCyber Threat Intelligence, Security Ratings -
Blog
‘The Perfect Scorecard’ Focuses on Communication Between CISOs and the Board
August 19, 2021The Perfect Scorecard: Getting an ‘A’ in Cybersecurity from your Board of Directors, is an attempt to close that gap. The Perfect Scorecard features insights from 17 leading CISOs and executives known for their leadership skills and their ability to communicate across roles and sectors.
More DetailsSecurity Ratings -
Blog, Learning Center
JBS Ransomware Attack Started in March and Much Larger in Scope than Previously Identified
June 8, 2021SecurityScorecard found that the JBS ransomware attack started in March and is much larger in scope than previously identified. Check out SecurityScorecard's research.
More DetailsCyber Threat Intelligence -
Blog
SecurityScorecard’s Board Trends Report Provides Actionable Insight
March 31, 2021An effective cybersecurity report needs to be quantifiable and should frame the risks as they pertain to the business’s goals, strategies, and risk tolerance.
More DetailsSecurity Ratings, Supply Chain Cyber Risk -
Blog, Learning Center
The Ultimate Data Breach Response Plan
March 24, 2021In a hyper-connected world, data breaches continue to increase in size and scope. To bolster your cybersecurity posture, you should put together a data breach response plan as a way to prepare your organization.
More DetailsServices, Tech Center -
Blog, Learning Center
How to Resolve Findings on Your SecurityScorecard Rating
March 16, 2021Understanding how to remediate and resolve SecurityScorecard security ratings findings can help you iterate your cybersecurity and compliance program for continued visibility into your risk posture. Find out more.
More DetailsSecurity Ratings -
Blog, Learning Center
34 Resources for Employee Cybersecurity Training
March 8, 2021Cybersecurity is a team effort. Check out these 34 resources for employee cybersecurity training.
More DetailsTech Center -
Blog, Learning Center
10 Examples of Recent and Impactful Ransomware Attacks
February 24, 2021With the cost of ransomware attacks growing, organizations must remain aware of the different ransomware variants used to compromise systems. Learn more about key ransomware threats
More DetailsCyber Threat Intelligence, Tech Center