Resources
Cybersecurity white papers, data sheets, webinars, videos and more
Resource Library
August 5, 2024
Up Level Your Amazon Security Lake with Attack Surface Intelligence
As global network infrastructure expands to include devices without traditional compute power, every organization’s attack surface becomes increasingly complex. Parallel to the increased complexity in the threat landscape is the increased scale and complexity of the signals and data necessary to produce meaningful cybersecurity insights. At its core, cybersecurity is a big data problem, requiring centralization of disparate data sources in uniform structure to enable continuous analytics.
August 2, 2024
Scorecarder Spotlight: Catarina Horta
Our series “Scorecarder Spotlight” showcases our talented employees and the incredible work they do. Meet Catarina Horta!
Scorecarder Spotlight
August 1, 2024
“What’s our number?”: Responding To Your Exposure to CrowdStrike Outage Event
One of the primary drivers of that question is the insurance industry’s challenges when managing systemic cyber risk since many believe that systemic cyber risk has the potential to bankrupt the industry. While there hasn’t been a catastrophic cyber incident that has proven the skeptics right, there have been several close calls.
July 19, 2024
Crowdstrike Outage: Know Your Supply Chain
Supply chain detection is vital for third-party incident response\r\nKnowing Your Supply Chain (KYSC) is becoming an increasingly important component of cyber resilience. Understanding the dependencies within your organization and those of your vendors is critical for responding to incidents effectively.
July 17, 2024
Scorecarder Spotlight: Andrew Correll
Our series “Scorecarder Spotlight” showcases our talented employees and the incredible work they do. Meet Andrew Correll!
Scorecarder Spotlight
July 15, 2024
How to Choose the Right Supply Chain Cyber Risk Managed Service
The time for action is now. A supply chain cyber risk managed service is the solution to identify and mitigate these growing threats proactively.
Professional Services
Supply Chain Cyber Risk
Third-Party Risk Management
June 25, 2024
The Role of Supply Chain Cyber Risk in U.S. Healthcare: Inside SecurityScorecard’s new report
This report examines historical breach data and security ratings to provide insights for healthcare organizations to stop supply chain breaches
Healthcare
June 13, 2024
Cost, convenience, and compliance: The value for insurers of the Forrester Total Economic Impact Study
The Forrester study found an ROI of 176% over three years, which indicates that the benefits outweighed the costs associated with adoption and integration.
June 11, 2024
SecurityScorecard Reduced External Third-Party Breaches by 75%
Forrester Total Economic ImpactTM Study: Automatic vendor detection, risk identification, and mitigation holistically manage supply chain cyber risk\r\n
June 10, 2024
Harmonizing Government, Policy, and Technology: Thoughts from Jeff Le, SecurityScorecard’s new VP of Global Government Affairs & Public Policy
For the past twenty years, I have had the pleasure of working at the intersection of public service, technology, and global security. As Deputy Cabinet Secretary to former California Governor Jerry Brown, I responded directly to the technology challenges that the state government faced to protect constituent data, deliver key services and resources to its residents, and recover from emergencies and disasters.\r\n
Executive Viewpoint
May 23, 2024
The Need for Speed: “Material” Confusion under the SEC’s Cyber Rules
This week, the SEC issued a statement addressing some of the rampant confusion and inconsistencies observed under the agency’s new cyber breach disclosure rule.
Public Sector
May 21, 2024
EPA Alert Warns Nation’s Drinking Water at Risk: SecurityScorecard’s recommendations for securing critical infrastructure
the U.S. Environmental Protection Agency (EPA) warned that cyberattacks against water utilities across the country are becoming more frequent and more severe.
May 20, 2024
SecurityScorecard Named a Leader in the Forrester Wave for Cybersecurity Risk Ratings
Today, we’re proud to announce that Forrester has named SecurityScorecard a Leader in The Forrester Wave: Cybersecurity Risk Ratings Platforms, Q2 2024.
May 16, 2024
National Vulnerability Database (NVD) leaves thousands of vulnerabilities without analysis data
The Common Vulnerabilities and Exposures (CVE) List and National Vulnerability Database (NVD) can no longer be considered a single central source of vulnerability truth\r\n
May 15, 2024
Compliance, collaboration, and communication: The benefits of NIST CSF 2.0
The new NIST CSF 2.0 empowers cybersecurity leaders to proactively address evolving threats and safeguard their organization’s assets, operations, and reputation.
Public Sector
May 15, 2024
What is Security Information and Event Management (SIEM)?
Security Information and Event Management (SIEM) has emerged as a critical component of modern cybersecurity strategies. This blog post delves into what SIEM is, its core functionalities, benefits, and why it’s essential for organizations of all sizes.\r\n
Tech Center
May 14, 2024
Cybersecurity leadership in an era of public-private partnerships
Learn about the shared responsibility between public and private organizations in combating cyber threats.
Public Sector
May 13, 2024
RSA 2024: The Art of Possible
Get a recap of SecurityScorecard’s trip to RSA 2024!
May 13, 2024
SecurityScorecard and Intel: Digging Past the Surface for Enhanced Protection
Explore how SecurityScorecard and Intel can jointly help organizations improve their security posture and controls.
May 10, 2024
Using Metrics that Matter to Protect Critical Infrastructure
Critical infrastructure owners and operators face significant challenges with technology, staff resources, and expertise to better manage cyber resilience.
Public Sector
Security Ratings
May 2, 2024
Examining the Concentration of Cyber Risk: How supply chains and global economies can adapt
This research points to an extreme concentration of cyber risk in just 15 vendors worldwide, while also detailing a surge in adversaries exploiting third-party vulnerabilities.
Third-Party Risk Management