SecurityScorecard Blog
Read the latest blog posts published weekly.
-
Blog, Learning Center
Port 445: Understanding Its Role in Cyber Attacks and Strategies for Defense
Explore how to secure Port 445 against cyber threats. This guide covers the role of Port 445 in cyber attacks and outlines defense strategies to protect your network.
More DetailsTech Center -
Blog, Learning Center
The Essential Guide to SMB Port Configuration for Enhanced Network Security
Master SMB port configuration for network security with our guide. Learn to protect against cyber threats and enhance operational safety efficiently
More DetailsTech Center -
Blog, Learning Center
Securing Port 139: Strategies to Prevent Unauthorized Access and Cyber Threats
Discover how to secure Port 139 against cyber threats with SMB protocol security, preventing unauthorized access and ensuring network safety.
More DetailsTech Center -
Blog, Learning Center
Implementing Non-Repudiation in Your Security Strategy: Best Practices and Techniques
Explore best practices for implementing non-repudiation in security strategies to ensure transaction authenticity and protect against fraud.
More DetailsTech Center -
Blog, Learning Center
Choosing Your Code Repository: Navigating the Security Landscape of Bitbucket vs GitHub
Explore the critical security features of Bitbucket and GitHub to make an informed decision on the right code repository for your project's needs.
More DetailsTech Center -
Blog
Third-party Cybersecurity Incident Response Readiness Plan
Explore essential strategies for third-party cybersecurity incident response readiness, minimizing supply chain vulnerabilities.
More DetailsThird-Party Risk Management -
Blog, Learning Center
How Brand Protection Software Shields Your Reputation
Safeguard your brand's online reputation with powerful protection software, defending against cyber threats and maintaining trust.
More DetailsTech Center -
Blog, Learning Center
Navigating the Risks of TCP 445: Strategies for Secure Network Communication
Discover how to secure TCP 445 against cyber threats with our essential strategies for robust network communication and safety.
More DetailsTech Center -
Blog, Learning Center
Proactive Measures to Prevent Data Theft
Explore effective strategies to prevent data theft and safeguard your organization's reputation and financial stability.
More DetailsTech Center -
Blog, Learning Center
Securing Samba Ports: Essential Practices for Safeguarding Your Network
Learn how to secure Samba ports and protect your network from unauthorized access and cyber threats with our essential security practices.
More DetailsTech Center -
Blog
The Cybersecurity of the S&P 500: An in-depth analysis from SecurityScorecard
With the Securities and Exchange Commission’s (SEC) mandate to disclose cybersecurity incidents, SecurityScorecard released the 2024 SecurityScorecard S&P 500 Cyber Threat Report.
More DetailsPaul Prudhomme, Principal Security Analyst
Security Ratings, Supply Chain Cyber Risk -
Blog
Harmonizing Government, Policy, and Technology: Thoughts from Jeff Le, SecurityScorecard’s new VP of Global Government Affairs & Public Policy
For the past twenty years, I have had the pleasure of working at the intersection of public service, technology, and global security. As Deputy Cabinet Secretary to former California Governor Jerry Brown, I responded directly to the technology challenges that the state government faced to protect constituent data, deliver key services and resources to its residents, and recover from emergencies and disasters.
More DetailsJeff Le, VP, Global Government Affairs & Public Policy
Executive Viewpoint