Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

Best Practices for Compliance Monitoring in Cybersecurity

January 10, 2024

Best Practices for Compliance Monitoring in Cybersecurity
Compliance is a key component to any cybersecurity program. However, due to the complex nature of laws and industry regulations, ensuring compliance is often very difficult for organizations. As non-compliance can result in considerable fines, organizations must be able to align their cybersecurity and compliance efforts. One way to do… Read More
Services
Tech Center
What is Continuous Cybersecurity Monitoring?

January 10, 2024

What is Continuous Cybersecurity Monitoring?
Moving away from on-premises applications and IT infrastructures as part of digital transformation strategies increases your digital footprint. The more connected cloud applications and services you add to your IT stack, the more potential risks you introduce because you’re expanding your attack surface. Cyber attacks… Read More
Tech Center
Top 7 Security Risks of Cloud Computing

January 10, 2024

Top 7 Security Risks of Cloud Computing
Many businesses are shifting workloads to the cloud in an effort to increase efficiency and streamline workloads. In fact, according to the Flexera 2021 State of the Cloud Report, roughly 90% of enterprises anticipate cloud usage will expand even further as a result of COVID-19. While cloud computing… Read More
Tech Center
What Is a Cybersecurity Audit and Why Does it Matter?

January 10, 2024

What Is a Cybersecurity Audit and Why Does it Matter?
As organizations embrace new digital technologies, the risk of cybersecurity threats is growing steadily. Digital transformation is increasing network complexity, which often creates security weaknesses and potential entry points for cyber adversaries to exploit. If left unaddressed, these cyber risks can disrupt business processes and harm goals. Therefore,… Read More
Tech Center
2025 Guide to Completing a Vendor Risk Management Questionnaire

January 10, 2024

2025 Guide to Completing a Vendor Risk Management Questionnaire
Vendor risk management is increasingly crucial in 2025 as enterprises integrate more cloud-based solutions into their IT ecosystems. With this shift comes greater compliance risks, making the verification of vendors’ security controls and regular security audits essential. Understanding and managing these risks effectively requires ongoing communication with… Read More
Tech Center
Fortinet Fortigate Vulnerability CVE-2023-27997: How to Surface Exposed Devices and Mitigate the Threat

January 10, 2024

Fortinet Fortigate Vulnerability CVE-2023-27997: How to Surface Exposed Devices and Mitigate the Threat
Recently, a critical vulnerability tracked as CVE-2023-27997 was identified in Fortinet Fortigate appliances. Fortinet makes some of the most popular firewall and VPN devices on the market, which makes them an attractive target for threat actors. This vulnerability has been exploited by the Chinese APT group Volt Typhoon, among others, targeting… Read More
Cyber Threat Intelligence
8 Types of Vendor Risks That Are Important to Monitor in 2025

January 10, 2024

8 Types of Vendor Risks That Are Important to Monitor in 2025
Outsourcing operations to third-party vendors has become a popular business strategy as it allows organizations to save money and increase operational efficiencies. As the role of third-party vendors expands, having vendor management processes in place becomes key to organizational success. Effective vendor management processes ensure not only cost efficiency but also… Read More
Tech Center
5 Ways to Meet Regulatory Compliance and Standards Requirements

January 10, 2024

5 Ways to Meet Regulatory Compliance and Standards Requirements
Compliance isn’t easy: it’s expensive, time consuming, and regulations are constantly changing. It may be hard to get buy-in from employees or leadership who see compliance as a barrier to productivity, and it may also be difficult to know when your organization falls out of compliance. But if you’re doing… Read More
Tech Center
What is Third Party Due Diligence? What You Should Know

January 10, 2024

What is Third Party Due Diligence? What You Should Know
Due diligence is one of the most important steps before starting a partnership with a third-party business, as it reveals any hidden risks or vulnerabilities that could harm your network. In this blog, we will define third-party due diligence, explore the benefits of conducting cybersecurity due diligence,… Read More
Tech Center
JBS Ransomware Attack Started in March and Much Larger in Scope than Previously Identified

January 10, 2024

JBS Ransomware Attack Started in March and Much Larger in Scope than Previously Identified
SecurityScorecard also found that 1 in 5 of the world’s food processing, production, and distribution companies rated have a known vulnerability in their exposed Internet assets Key insights Using SecurityScorecard’s proprietary tools, our Investigations & Analysis (I&A) team observed the following: The JBS campaign began with a reconnaissance phase in… Read More
Cyber Threat Intelligence
STRIKE Team
3 Takeaways: New SEC Cyber Risk Disclosure Rules

January 9, 2024

3 Takeaways: New SEC Cyber Risk Disclosure Rules
New rules require a detailed assessment of supply chain and organizational resilience Yesterday the US Securities and Exchange Commission (SEC) voted 3-2 to issue long-awaited regulations that mandate uniform cyber incident disclosures for public companies. The SEC’s rulemaking progress has been lengthy and controversial, and cybersecurity experts and business advocates have… Read More
Services
The Evolution of Cybersecurity Solutions and Threats

January 9, 2024

The Evolution of Cybersecurity Solutions and Threats
In 1970, the world experienced its first “cyber attack” – What first started as a harmless joke, paved the way for a new wave of criminality – cybercrime. Since then, attacks have become more sophisticated with the use of malware, ransomware, and phishing attacks, among … Read More
Cyber Threat Intelligence
Security Ratings
Top 5 Security Vulnerabilities of 2023

January 9, 2024

Top 5 Security Vulnerabilities of 2023
Why 2023 is a year of ‘digital forest fires’: New Attack Surface Intelligence Research from SecurityScorecard 2023 is a year of “digital forest fires.” The MOVEit and the Barracuda Networks’ email supply chain attacks underscore the massive butterfly effect a single software flaw can have on the threat landscape. Supply… Read More
Cyber Threat Intelligence
Supply Chain Cyber Risk
8 Top Strategies for Cybersecurity Risk Mitigation

January 9, 2024

8 Top Strategies for Cybersecurity Risk Mitigation
In recent years, there has been a clear rise in threat volume and sophistication as many cybercriminals shift to techniques that can effectively evade detection and easily go after high-value targets. IoT devices are becoming a focus for threat actors, and threats related to credential harvesting and ransomware are also… Read More
Tech Center
What is the CIA Triad? Definition, Importance, & Examples

January 9, 2024

What is the CIA Triad? Definition, Importance, & Examples
Confidentiality, Integrity, and Availability. These are the three core components of the CIA triad, an information security model meant to guide an organization’s security procedures and policies. While people outside the information security community might hear the phrase “CIA Triad” and… Read More
Tech Center
2025 Third-Party Vendor Risk Management in the Financial Industry

January 5, 2024

2025 Third-Party Vendor Risk Management in the Financial Industry
Due to their extensive reliance on third-party vendors, financial institutions face heightened cyber risks in 2024. These vendors are integral to their operations but can also become potential cybersecurity weak points. The growing dependency on these vendor relationships  necessitates robust third-party vendor risk management… Read More
Tech Center
What is Cyber Attack Insurance? Best Practices for Protection

January 5, 2024

What is Cyber Attack Insurance? Best Practices for Protection
Businesses of all sizes are becoming increasingly reliant on technology to conduct their operations efficiently. While technology offers numerous benefits, it also exposes organizations to growing digital threats, including phishing attacks, malware infections, and sophisticated social engineering campaigns. As the frequency and sophistication… Read More
Cyber Insurance
Executive Viewpoint
Tech Center
The Most Important Security Metrics to Maintain Compliance: Best Practices for Prioritizing Cyber Resilience

January 4, 2024

The Most Important Security Metrics to Maintain Compliance: Best Practices for Prioritizing Cyber Resilience
With the recent surge of high-profile data breaches, supply chain vulnerabilities (SolarWinds, Log4j, and  MOVEit, most notably), and targeted cyberattacks, the digital world is becoming increasingly precarious. At the same time, consumers are increasingly sharing sensitive data with companies in exchange for convenience and efficiency. For these reasons, organizations have a growing… Read More
Security Ratings
Tech Center
In-Depth Review: How SecurityScorecard Stacks Up Against UpGuard in 2024

January 3, 2024

In-Depth Review: How SecurityScorecard Stacks Up Against UpGuard in 2024
In the dynamic world of cybersecurity, choosing the right platform can be pivotal for an organization’s digital safety. As we delve into 2024, two major players, SecurityScorecard and UpGuard, continue to make waves. This in-depth review compares these two companies and highlights how SecurityScorecard’s offerings often outshine those of… Read More
Security Ratings
Optimizing Incident Response with Advanced Threat Intelligence

December 14, 2023

Optimizing Incident Response with Advanced Threat Intelligence
In today’s cyber landscape, rapid and effective incident response is crucial for organizations to mitigate the impact of cyber attacks. Advanced Threat Intelligence (ATI) is emerging as a key player in enhancing incident response strategies. This blog post aims to elucidate how modern threat intelligence tools refine and improve these strategies, equipping… Read More
Cyber Threat Intelligence
Tech Center
What are Tabletop Exercises?

November 9, 2023

What are Tabletop Exercises?
According to the latest IBM Cost of a Data Breach Report, the average breach costs $4.35M per incident, climbing by 12.7% (from 3.86 million USD) in IBM’s 2020 report. This does not account for lost business opportunities and lingering reputational damage. One of the best ways to prepare your… Read More
Services
Tech Center