Resources
Cybersecurity white papers, data sheets, webinars, videos and more
Resource Library
April 16, 2025
How Much Do Healthcare Data Breaches Really Cost?
Learn from the most devastating healthcare data breaches in U.S. history—and how to protect your organization’s PHI, PII, and patient trust.
Cyber Threat Intelligence
Enterprise Cyber Risk
Third-Party Risk Management
April 15, 2025
Cybersecurity Laws in the UK: What Businesses Need to Know in 2025
Understand how evolving UK regulations shape your cyber strategy—and how to stay compliant and resilient across your digital ecosystem.
Compliance
Cybersecurity
Enterprise Cyber Risk
April 11, 2025
CISOs: The Perfect SCORE With Your Board
Boards don’t operate in threat models and tech stacks. They operate in risk, revenue, and accountability. And if you want their support, you need to meet them there. SecurityScorecard created the SCORE framework to help CISOs turn cybersecurity into a board-level conversation that gets results.
Executive Viewpoint
April 11, 2025
SIM Card Hacking: What It Is, How It Works, and How to Protect Yourself
SIM cards might seem like harmless pieces of plastic, but they’re often a gateway for serious cyber attacks. When hackers take over your mobile number, they can intercept private data, bypass security controls, and even drain your bank account.\r\n
Cyber Threat Intelligence
Enterprise Cyber Risk
Government
April 9, 2025
Scorecarder Spotlight: Noor Al-Baker
Our series “Scorecarder Spotlight” showcases our talented employees and the incredible work they do. Meet Noor Al-Baker!
Scorecarder Spotlight
April 2, 2025
SecurityScorecard In The News Q1 2025
Catch up on SecurityScorecard press coverage from Q1 2025, including TV interviews, global report-driven media coverage, North America, EMEA, and APAC press mentions, and executive bylines examining third-party breach trends, software supply chain attacks, nation-state cyber activity, and regulatory readiness.
March 21, 2025
What is Supply Chain Detection and Response (SCDR)?
Supply Chain Detection and Response (SCDR) is a new cybersecurity framework that identifies, prioritizes, and remediates vulnerabilities across an organization’s vendor ecosystem. Its purpose is preventing supply chain attacks from threat actors and mitigating concentration risk when critical providers experience outages or security failures.
Threat-Informed TPRM
March 18, 2025
Automating Vendor Risk Management and Assessments
Automated vendor risk assessments provide visibility into third-party vendors’ cybersecurity and enhance the third-party risk management process. Learn more.
March 11, 2025
The Principles for Fair & Accurate Security Ratings: A Focus on Confidentiality
Our Security ratings align with the Principles for Fair & Accurate Security Ratings, published by the US Chamber of Commerce. As part of this effort we strive to educate the cybersecurity community on how our products align with these important principles.
March 5, 2025
Scorecarder Spotlight: Luciano Bargmann
Our series “Scorecarder Spotlight” showcases our talented employees and the incredible work they do. Meet Luciano Bargmann!
Scorecarder Spotlight
March 4, 2025
3 Tangible Benefits of an A Rating
Security ratings are a standard in cybersecurity. Many organizations rely on them to manage their security programs and they create ROI for the organization. Despite the potential benefits, it can be challenging for organizations who are evaluating different security ratings options to determine the value they will get from them.
March 4, 2025
Odyssey.conf 2025: Charting the Course for Cyber Resilience
Last week, SecurityScorecard hosted our second annual Odyssey.conf in Miami, Florida. This year’s conference focused on cyber resilience, providing attendees with actionable insights and cutting-edge strategies to navigate the ever-evolving threat landscape.
Threat-Informed TPRM
March 4, 2025
From Reactive to Resilient: A New Mindset for Supply Chain Cybersecurity
Key takeaways from a recent webinar featuring SecurityScorecard CISO, Steve Cobb, on how organizations can strengthen their cyber resilience in the face of evolving threats.
Threat-Informed TPRM
February 18, 2025
Third-Party Risk Management Regulations: What You Should Know
Third-party risk management regulations may seem like red tape nuisance at first, but these regulations ultimately reduce your organization’s risk as well. Learn more.
February 13, 2025
Lazarus Group Targets Developers Through NPM Packages and Supply Chain Attacks
North Korea’s Lazarus Group is evolving its tactics again. The latest campaign, dubbed Operation Marstech Mayhem, introduces an advanced implant named “Marstech1.”
STRIKE Team
February 10, 2025
A Deep Peek at DeepSeek
DeepSeek’s rapid ascent in the AI space has made it impossible to ignore. Its sophisticated models and AI assistant have captured global attention. And, while headlines focus on DeepSeek’s capabilities, STRIKE research exposes critical security flaws, hidden data flows, and unanswered questions about who has access to the data and why.
STRIKE Team
February 4, 2025
Third-Party Risk Management Framework: How to Select the Right One
Third parties come with significant cyber security risks. Learn how to select the right risk management framework.
February 4, 2025
Beyond the Perimeter: Why CISOs Need Threat-Informed TPRM
Organizations rely heavily on external vendors and suppliers, creating complex supply chains vital for operations. However, this introduces a new dimension of risk: supply chain attacks move fast. While standard TPRM focuses on compliance, Threat-Informed TPRM is a proactive, data-first defense engine designed to stop attacks… Read More
Supply Chain Cyber Risk
Threat-Informed TPRM
January 29, 2025
Operation Phantom Circuit: North Korea’s Global Data Exfiltration Campaign
In December 2024, a routine software update concealed a global threat. Attackers from the Lazarus Group, based in North Korea, infiltrated trusted development tools, compromising hundreds of victims worldwide. This sophisticated campaign, code-named “Phantom Circuit,” targeted cryptocurrency and technology developers, employing advanced obfuscation techniques through proxy servers in Hasan, Russia.
STRIKE Team
January 21, 2025
5 Reasons to Integrate Continuous Monitoring into Your TPRM Program
Learn 5 reasons your organization should integrate continuous monitoring into their third-party risk management program. Read SecurityScorecard’s blog
January 17, 2025
What is the Threat Landscape?
Discover the current threat landscape and learn how to identify, assess, and mitigate evolving cyber risks to protect your organization from potential attacks.