SecurityScorecard Blog
Read the latest blog posts published weekly.
-
BlogHow to Avoid Online Tax Day Scams: Tips to protect your finances and data
March 25, 2024As Tax Day in the U.S. looms on the horizon, so too does the risk of falling victim to online scams. In 1986, the first year that e-filing was available, five people filed their returns electronically. Since then, the popularity of e-filing has increased so much that 92% of individual tax returns are now e-filed. As online tax filing and payment have become more popular, though, scams targeting unsuspecting taxpayers have as well.
More DetailsRob Ames, Senior Staff Threat Researcher
Tech Center -
BlogWhy metrics—and context—matter: How CISOs can measure and communicate cyber resilience
March 21, 2024Cyberattacks in the digital supply chain are now some of the most common cyber incidents today, with many of the recent major breaches resulting from a single vulnerability. Because of the rapid pace and scale of these attacks, cyber leaders can no longer rely on static analyses of their environments, and must continuously assess cyber risk across their entire supply chain and vendor ecosystem. They must also produce quantitative metrics to measure their organizations’ dynamic risk in a standardized, easy-to-understand way. Here, we’ll discuss several metrics that cyber leaders can use to measure cyber risk and communicate with multiple stakeholders.
More DetailsJim Routh, Senior Advisor, SecurityScorecard
Executive Viewpoint, Security Ratings -
BlogHarnessing the Power of Artificial Intelligence: A closer look at the European Union’s new landmark legislation
March 20, 2024Ethical implications of AI, where and how to use the technology, and understandability demand careful consideration and regulatory oversight to ensure fairness, accountability, and transparency. Against this backdrop, last week lawmakers in the European Union approved a first-of-its-kind law that will govern how businesses and organizations in the EU use artificial intelligence (AI).
More DetailsBrendan Peter, VP, Global Government Affairs, SecurityScorecard
Executive Viewpoint, Public Sector -
Blog, Learning CenterFrom Brackets to Breaches: Securing Your Network Against March Madness Scams
March 20, 2024Shield your data from cyber threats during March Madness with these tips to help protect you during the annual tournament.
More DetailsSupply Chain Cyber Risk -
BlogCelebrating Cybersecurity Excellence: Forbes Most Cybersecure Banks, 2024
March 19, 2024Explore Forbes' 2024 list of top consumer banks for cybersecurity, led by elite CISOs. Dive into their strategies for a safer digital world.
More DetailsDr. Aleksandr Yampolskiy, CEO and Co-Founder, SecurityScorecard
Security Ratings -
Blog, Learning CenterWhat are Security Ratings?
March 18, 2024Security ratings provide a comprehensive view of a company’s security performance. Learn more about what security ratings are and common use cases.
More DetailsTech Center -
BlogForrester Includes SecurityScorecard in Cybersecurity Risk Ratings (CRR) Landscape Report
March 12, 2024To help sift through the ever-growing field of cybersecurity ratings, Forrester recently published The Cybersecurity Risk Ratings Platforms Landscape, Q1 2024. SecurityScorecard is proud to be included in this landscape, in the company of other notable vendors in the field. Once a misunderstood technology, Cybersecurity Risk Ratings platforms (CRRs) have earned their place in the spotlight in the last several years.
More DetailsBennett Morrison, Vice President of Product & Strategy
Security Ratings -
BlogInfosys McCamish Systems Third-Party Breach: Possible Attack Vectors and Infrastructure
March 12, 2024In response to the identification of Infosys McCamish Systems (IMS) as the point of origin for a third-party data breach claimed by the LockBit ransomware group, SecurityScorecard researchers reviewed findings on the security hygiene of IMS.
More DetailsRob Ames and Paul Prudhomme, Threat Research and Intelligence, SecurityScorecard
Cyber Threat Intelligence -
Blog, Learning CenterDefender for Endpoint: Transforming Endpoint Security with Advanced Threat Protection
March 8, 2024Explore how Microsoft's Sentinel transforms cybersecurity with AI, offering advanced threat detection and automated responses.
More DetailsTech Center -
BlogNew Malware Attributed to Russian Hacking Group APT28
March 6, 2024Late last year, the Computer Emergency Response Team of Ukraine (CERT-UA) released an advisory that reported cyberattacks targeting Ukrainian state organizations attributed to the Kremlin-backed nation-state group APT28, aka Fancy Bear/Sofacy. The advisory listed the use of a new backdoor named “OCEANMAP,” detailed in this whitepaper.
More DetailsCyber Threat Intelligence -
Blog, Learning CenterWhat is Sentinel? Harnessing the Power of Cloud-Native SIEM for Modern Cybersecurity Challenges
March 6, 2024Explore how Microsoft's Sentinel SIEM solution transforms cybersecurity with AI, offering advanced threat detection and automated responses.
More DetailsTech Center -
BlogSecurityScorecard 2024 Global Third-Party Cybersecurity Breach Report: Software supply chain is top target for ransomware groups
February 28, 2024The SecurityScorecard Global Third-Party Breach Report uses the world's largest proprietary risk and threat dataset to provide unique insights into the intricate web of supply chain vulnerabilities exploited by ransomware groups.
More DetailsPaul Prudhomme, STRIKE Threat Intelligence Analyst
Cyber Threat Intelligence, Supply Chain Cyber Risk