Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

Using Metrics that Matter to Protect Critical Infrastructure

May 10, 2024

Using Metrics that Matter to Protect Critical Infrastructure
Critical infrastructure owners and operators face significant challenges with technology, staff resources, and expertise to better manage cyber resilience.
Public Sector
Security Ratings
Examining the Concentration of Cyber Risk: How supply chains and global economies can adapt

May 2, 2024

Examining the Concentration of Cyber Risk: How supply chains and global economies can adapt
This research points to an extreme concentration of cyber risk in just 15 vendors worldwide, while also detailing a surge in adversaries exploiting third-party vulnerabilities.
Third-Party Risk Management
Insights from the Experts: Legal, Compliance, and Security Perspectives on SEC Regulations

April 26, 2024

Insights from the Experts: Legal, Compliance, and Security Perspectives on SEC Regulations
SecurityScorecard recently hosted a webinar discussing the implications of the new rules and how compliance, security, and legal experts can elevate their game to meet these new regulations.
Public Sector
Streamlining Your Vulnerability Management Process

April 18, 2024

Streamlining Your Vulnerability Management Process
Use this step-by-step guide to streamline your vulnerability management process and maintain a robust cybersecurity posture.
Attack Surface Management
Optimizing Rsync Port Configurations for Enhanced Performance and Security

April 18, 2024

Optimizing Rsync Port Configurations for Enhanced Performance and Security
Explore the nuances of optimizing Rsync port configurations for an optimal balance between performance and security.\r\n
Tech Center
Cyberattack at Sisense Puts Critical Infrastructure on Alert

April 11, 2024

Cyberattack at Sisense Puts Critical Infrastructure on Alert
SecurityScorecard details the large-scale cyberattack on Sisense, a major business analytics software company used by both the private and public sectors.
Public Sector
Change Healthcare Ransomware Attack Spotlights Single Point of Failure with Third-Party Vendor

April 10, 2024

Change Healthcare Ransomware Attack Spotlights Single Point of Failure with Third-Party Vendor
The ongoing cyberattack on Change Healthcare, a major player in medical claims processing in the United States, had profound repercussions across the healthcare sector.
Healthcare
Third-Party Risk Management
How SecurityScorecard STRIKE Identifies Zero Days in the Wild

April 9, 2024

How SecurityScorecard STRIKE Identifies Zero Days in the Wild
Discover how SecurityScorecard’s Zero-Day-as-a-Service (ZDaaS) identifies new and emerging zero-day threats across your third-party vendor landscape.
Cyber Threat Intelligence
SecurityScorecard Unveils the Industry’s Most Predictive Cybersecurity Risk Ratings with Refined Scoring Algorithm

April 9, 2024

SecurityScorecard Unveils the Industry’s Most Predictive Cybersecurity Risk Ratings with Refined Scoring Algorithm
As businesses strive to reinforce their defenses against these evolving threats, the need for a reliable and predictive cybersecurity risk assessment tool has never been greater.
Security Ratings
Examining NIST CSF 2.0: Everything you need to know

April 4, 2024

Examining NIST CSF 2.0: Everything you need to know
In 2014, the National Institute of Standards and Technology (NIST) released its Cybersecurity Framework (CSF) to help organizations better understand, reduce, and communicate cybersecurity risk. Ten years later, NIST has released Version 2.0.
Executive Viewpoint
The Cybersecurity of the S&P 500: An in-depth analysis from SecurityScorecard

April 3, 2024

The Cybersecurity of the S&P 500: An in-depth analysis from SecurityScorecard
With the Securities and Exchange Commission’s (SEC) mandate to disclose cybersecurity incidents, SecurityScorecard released the 2024 SecurityScorecard S&P 500 Cyber Threat Report.
Security Ratings
Supply Chain Cyber Risk
NVD Database Crisis of 2024: What We Learned?

April 2, 2024

NVD Database Crisis of 2024: What We Learned?
NVD database issues in 2024 left organizations vulnerable. Discover how CVEDetails offers superior vulnerability intelligence and reliable data.
Services
EDR vs XDR: Choosing the Right Cybersecurity Solution for Your Organization

March 28, 2024

EDR vs XDR: Choosing the Right Cybersecurity Solution for Your Organization
XDR or EDR? Learn which solution is best for your organization to effectively combat evolving cyber threats.
Tech Center
Evolving Threat Detection: The Strategic Advantages of XDR over Traditional EDR Solutions

March 28, 2024

Evolving Threat Detection: The Strategic Advantages of XDR over Traditional EDR Solutions
Discover how XDR solutions offer strategic advantages over traditional EDR for enhanced cybersecurity and threat detection.
Tech Center
Breaches Beyond Borders: The global landscape of third-party risk

March 27, 2024

Breaches Beyond Borders: The global landscape of third-party risk
Read some of the highlights from SecurityScorecard’s recent webinar, which examined our Global Third-Party Cyber Breach report.
Third-Party Risk Management
How to Avoid Online Tax Day Scams: Tips to protect your finances and data

March 25, 2024

How to Avoid Online Tax Day Scams: Tips to protect your finances and data
As Tax Day in the U.S. looms on the horizon, so too does the risk of falling victim to online scams. In 1986, the first year that e-filing was available, five people filed their returns electronically. Since then, the popularity of e-filing has increased so much that 92% of individual tax returns are now e-filed. As online tax filing and payment have become more popular, though, scams targeting unsuspecting taxpayers have as well.
Tech Center
Securing Samba Ports: Essential Practices for Safeguarding Your Network

March 25, 2024

Securing Samba Ports: Essential Practices for Safeguarding Your Network
Learn how to secure Samba ports and protect your network from unauthorized access and cyber threats with our essential security practices.
Tech Center
Proactive Measures to Prevent Data Theft

March 22, 2024

Proactive Measures to Prevent Data Theft
Explore effective strategies to prevent data theft and safeguard your organization’s reputation and financial stability.
Tech Center
How Brand Protection Software Shields Your Reputation

March 22, 2024

How Brand Protection Software Shields Your Reputation
Safeguard your brand’s online reputation with powerful protection software, defending against cyber threats and maintaining trust.
Tech Center
Why metrics—and context—matter: How CISOs can measure and communicate cyber resilience

March 21, 2024

Why metrics—and context—matter: How CISOs can measure and communicate cyber resilience
Cyberattacks in the digital supply chain are now some of the most common cyber incidents today, with many of the recent major breaches resulting from a single vulnerability. Because of the rapid pace and scale of these attacks, cyber leaders can no longer rely on static analyses of their environments, and must continuously assess cyber risk across their entire supply chain and vendor ecosystem. They must also produce quantitative metrics to measure their organizations’ dynamic risk in a standardized, easy-to-understand way. Here, we’ll discuss several metrics that cyber leaders can use to measure cyber risk and communicate with multiple stakeholders.
Executive Viewpoint
Security Ratings
From Brackets to Breaches: Securing Your Network Against March Madness Scams

March 20, 2024

From Brackets to Breaches: Securing Your Network Against March Madness Scams
Shield your data from cyber threats during March Madness with these tips to help protect you during the annual tournament.
Supply Chain Cyber Risk