SecurityScorecard Blog
Read the latest blog posts published weekly.
-
Blog
What is Cyber Risk Quantification? A Comprehensive Guide
October 6, 2022Cyber risk quantification is the process of quantifying cyber risk by putting a monetary value on the potential impact of each prospective threat. Learn more.
More DetailsCyber Insurance, Tech Center -
Blog
What is Cyber Risk Quantification? A Comprehensive Guide
October 6, 2022Cyber risk quantification is the process of quantifying cyber risk by putting a monetary value on the potential impact of each prospective threat. Learn more.
More DetailsCyber Insurance, Tech Center -
Blog
SecurityScorecard Partners with JCDC to Democratize Continuous Monitoring and Cybersecurity Risk Management
September 28, 2022Cybersecurity is a team sport, and SecurityScorecard is proud to partner with the Joint Cyber Defense Collaborative (JCDC) to share cyber threat information in defense of public and private critical infrastructure.
More DetailsPublic Sector -
Blog
TTPs Associated With a New Version of the BlackCat Ransomware
September 6, 2022In this post, we describe a real engagement that we recently handled by giving details about the tools, techniques, and procedures (TTPs) used by this threat actor.
More DetailsCyber Threat Intelligence -
Blog
Analysis of APT35 infrastructure reveals interest in Egyptian Shipping Companies
August 31, 2022More DetailsRyan Slaney and Robert Ames, Staff Threat Researchers and Alex Heid, Chief Research Officer
-
Blog
Was the Explosion at Freeport LNG a Result of a Russian Cyber Attack?
August 2, 2022More DetailsDr. Robert Ames, Staff Threat Researcher
-
Blog
New: SecurityScorecard Extension for Chrome
July 22, 2022With the new SecurityScorecard Chrome Extension, you can automatically see the simple A-F security rating of the websites you visit, enabling you to evaluate the risk of the sites you visit before supplying your data to them.
More DetailsAmmon Brown
Security Ratings -
Blog
KillNet Utilizes CC-Attack: A Quick & Dirty DDoS Method
May 25, 2022SecurityScorecard's analysis of CC-Attack reveals the script automates the process of using open proxy servers to relay attacks.
More DetailsCyber Threat Intelligence -
Blog, Learning Center
Understanding the Basics of Cyber Insurance: What You Need to Know
March 7, 2022Learn more about the basics of cyber insurance and how it can -- and can't -- help your organization recover from a cyber incident.
More DetailsCyber Insurance, Tech Center -
Blog, Learning Center
First-Party vs Third-Party Cyber Insurance: What’s the Difference?
December 6, 2021First-party and third-party cyber insurance work to protect your business from serious financial and reputational damage that may result from a data breach. Learn more.
More DetailsCyber Insurance, Tech Center -
Blog, Learning Center
The Evolution of Cybersecurity Solutions and Threats
October 25, 2021To know where cybersecurity solutions are headed, we must know where they came from. Learn more about the evolution of cybersecurity solutions.
More DetailsCyber Threat Intelligence, Security Ratings -
Blog
‘The Perfect Scorecard’ Focuses on Communication Between CISOs and the Board
August 19, 2021The Perfect Scorecard: Getting an ‘A’ in Cybersecurity from your Board of Directors, is an attempt to close that gap. The Perfect Scorecard features insights from 17 leading CISOs and executives known for their leadership skills and their ability to communicate across roles and sectors.
More DetailsSecurity Ratings