Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

How Much Do Healthcare Data Breaches Really Cost?

April 16, 2025

How Much Do Healthcare Data Breaches Really Cost?
Learn from the most devastating healthcare data breaches in U.S. history—and how to protect your organization’s PHI, PII, and patient trust.
Cyber Threat Intelligence
Enterprise Cyber Risk
Third-Party Risk Management
Cybersecurity Laws in the UK: What Businesses Need to Know in 2025

April 15, 2025

Cybersecurity Laws in the UK: What Businesses Need to Know in 2025
Understand how evolving UK regulations shape your cyber strategy—and how to stay compliant and resilient across your digital ecosystem.
Compliance
Cybersecurity
Enterprise Cyber Risk
CISOs: The Perfect SCORE With Your Board

April 11, 2025

CISOs: The Perfect SCORE With Your Board
Boards don’t operate in threat models and tech stacks. They operate in risk, revenue, and accountability. And if you want their support, you need to meet them there. SecurityScorecard created the SCORE framework to help CISOs turn cybersecurity into a board-level conversation that gets results.
Executive Viewpoint
SIM Card Hacking: What It Is, How It Works, and How to Protect Yourself

April 11, 2025

SIM Card Hacking: What It Is, How It Works, and How to Protect Yourself
SIM cards might seem like harmless pieces of plastic, but they’re often a gateway for serious cyber attacks. When hackers take over your mobile number, they can intercept private data, bypass security controls, and even drain your bank account.\r\n
Cyber Threat Intelligence
Enterprise Cyber Risk
Government
Scorecarder Spotlight: Noor Al-Baker

April 9, 2025

Scorecarder Spotlight: Noor Al-Baker
Our series “Scorecarder Spotlight” showcases our talented employees and the incredible work they do. Meet Noor Al-Baker!
Scorecarder Spotlight
SecurityScorecard In The News Q1 2025

April 2, 2025

SecurityScorecard In The News Q1 2025
Catch up on SecurityScorecard press coverage from Q1 2025, including TV interviews, global report-driven media coverage, North America, EMEA, and APAC press mentions, and executive bylines examining third-party breach trends, software supply chain attacks, nation-state cyber activity, and regulatory readiness.
What is Supply Chain Detection and Response (SCDR)?

March 21, 2025

What is Supply Chain Detection and Response (SCDR)?
Supply Chain Detection and Response (SCDR) is a new cybersecurity framework that identifies, prioritizes, and remediates vulnerabilities across an organization’s vendor ecosystem. Its purpose is preventing supply chain attacks from threat actors and mitigating concentration risk when critical providers experience outages or security failures.
Threat-Informed TPRM
Automating Vendor Risk Management and Assessments

March 18, 2025

Automating Vendor Risk Management and Assessments
Automated vendor risk assessments provide visibility into third-party vendors’ cybersecurity and enhance the third-party risk management process. Learn more.
The Principles for Fair & Accurate Security Ratings: A Focus on Confidentiality

March 11, 2025

The Principles for Fair & Accurate Security Ratings: A Focus on Confidentiality
Our Security ratings align with the Principles for Fair & Accurate Security Ratings, published by the US Chamber of Commerce. As part of this effort we strive to educate the cybersecurity community on how our products align with these important principles.
Scorecarder Spotlight: Luciano Bargmann

March 5, 2025

Scorecarder Spotlight: Luciano Bargmann
Our series “Scorecarder Spotlight” showcases our talented employees and the incredible work they do. Meet Luciano Bargmann!
Scorecarder Spotlight
3 Tangible Benefits of an A Rating

March 4, 2025

3 Tangible Benefits of an A Rating
Security ratings are a standard in cybersecurity. Many organizations rely on them to manage their security programs and they create ROI for the organization. Despite the potential benefits, it can be challenging for organizations who are evaluating different security ratings options to determine the value they will get from them.
Odyssey.conf 2025: Charting the Course for Cyber Resilience

March 4, 2025

Odyssey.conf 2025: Charting the Course for Cyber Resilience
Last week, SecurityScorecard hosted our second annual Odyssey.conf in Miami, Florida. This year’s conference focused on cyber resilience, providing attendees with actionable insights and cutting-edge strategies to navigate the ever-evolving threat landscape.
Threat-Informed TPRM
From Reactive to Resilient: A New Mindset for Supply Chain Cybersecurity

March 4, 2025

From Reactive to Resilient: A New Mindset for Supply Chain Cybersecurity
Key takeaways from a recent webinar featuring SecurityScorecard CISO, Steve Cobb, on how organizations can strengthen their cyber resilience in the face of evolving threats.
Threat-Informed TPRM
Third-Party Risk Management Regulations: What You Should Know

February 18, 2025

Third-Party Risk Management Regulations: What You Should Know
Third-party risk management regulations may seem like red tape nuisance at first, but these regulations ultimately reduce your organization’s risk as well. Learn more.
Lazarus Group Targets Developers Through NPM Packages and Supply Chain Attacks

February 13, 2025

Lazarus Group Targets Developers Through NPM Packages and Supply Chain Attacks
North Korea’s Lazarus Group is evolving its tactics again. The latest campaign, dubbed Operation Marstech Mayhem, introduces an advanced implant named “Marstech1.”
STRIKE Team
A Deep Peek at DeepSeek

February 10, 2025

A Deep Peek at DeepSeek
DeepSeek’s rapid ascent in the AI space has made it impossible to ignore. Its sophisticated models and AI assistant have captured global attention. And, while headlines focus on DeepSeek’s capabilities, STRIKE research exposes critical security flaws, hidden data flows, and unanswered questions about who has access to the data and why.
STRIKE Team
Third-Party Risk Management Framework: How to Select the Right One

February 4, 2025

Third-Party Risk Management Framework: How to Select the Right One
Third parties come with significant cyber security risks. Learn how to select the right risk management framework.
Beyond the Perimeter: Why CISOs Need Threat-Informed TPRM

February 4, 2025

Beyond the Perimeter: Why CISOs Need Threat-Informed TPRM
Organizations rely heavily on external vendors and suppliers, creating complex supply chains vital for operations. However, this introduces a new dimension of risk: supply chain attacks move fast. While standard TPRM focuses on compliance, Threat-Informed TPRM is a proactive, data-first defense engine designed to stop attacks… Read More
Supply Chain Cyber Risk
Threat-Informed TPRM
Operation Phantom Circuit:  North Korea’s Global Data Exfiltration Campaign

January 29, 2025

Operation Phantom Circuit: North Korea’s Global Data Exfiltration Campaign
In December 2024, a routine software update concealed a global threat. Attackers from the Lazarus Group, based in North Korea, infiltrated trusted development tools, compromising hundreds of victims worldwide. This sophisticated campaign, code-named “Phantom Circuit,” targeted cryptocurrency and technology developers, employing advanced obfuscation techniques through proxy servers in Hasan, Russia.
STRIKE Team
5 Reasons to Integrate Continuous Monitoring into Your TPRM Program

January 21, 2025

5 Reasons to Integrate Continuous Monitoring into Your TPRM Program
Learn 5 reasons your organization should integrate continuous monitoring into their third-party risk management program. Read SecurityScorecard’s blog
What is the Threat Landscape?

January 17, 2025

What is the Threat Landscape?
Discover the current threat landscape and learn how to identify, assess, and mitigate evolving cyber risks to protect your organization from potential attacks.