Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

Integrating Defender for Identity Into Your Security Strategy: A Step-by-Step Guide

February 23, 2024

Integrating Defender for Identity Into Your Security Strategy: A Step-by-Step Guide
In this step-by-step guide, we’ll walk you through the process of incorporating Defender for Identity into your cybersecurity program, empowering you to enhance your organization’s security posture and defend against unauthorized access.\r\n
Tech Center
Top 10 Cybersecurity Questions to Ask Your Vendors: A step-by-step guide to reduce supply chain risk

February 22, 2024

Top 10 Cybersecurity Questions to Ask Your Vendors: A step-by-step guide to reduce supply chain risk
Ask these ten key questions to make sure your organization’s vendor questionnaire doesn’t become just a “check-the-box” exercise. \r\n
Supply Chain Cyber Risk
Tech Center
Beating LockBit at its Own Game: Law enforcement’s takedown of a prolific ransomware group

February 22, 2024

Beating LockBit at its Own Game: Law enforcement’s takedown of a prolific ransomware group
After a years-long investigation, this week the FBI and law enforcement agencies in the UK and Europe took over the main website of the cybercrime group known as LockBit
Cyber Threat Intelligence
3 2 1… Impact! Early Results under the SEC’s Cybersecurity Governance Rule

February 22, 2024

3 2 1… Impact! Early Results under the SEC’s Cybersecurity Governance Rule
The early results under the SEC’s cybersecurity governance rule are in: companies need better preparedness and processes for compliance.
Public Sector
Services
Chinese Hacking Group Targets US Critical Infrastructure

February 20, 2024

Chinese Hacking Group Targets US Critical Infrastructure
The FBI and CISA are warning that “Volt Typhoon” has been lurking in US critical infrastructure systems for at least five years. \r\n
Cyber Threat Intelligence
Unveiling the Shadows: The Rise of Volt Typhoon and the New Age of Cyber Threats

February 20, 2024

Unveiling the Shadows: The Rise of Volt Typhoon and the New Age of Cyber Threats
Explore the rise of Volt Typhoon and the evolving threat of Chinese hacking groups, highlighting the shift in cyber threats and the defensive strategies shaping the future of cybersecurity
Cyber Threat Intelligence
The Human Factor in Cybersecurity

February 16, 2024

The Human Factor in Cybersecurity
While technological advancements continue to fortify digital defenses, human behavior remains a pivotal element in determining the success or failure of cybersecurity measures.
Tech Center
What Exactly is the Dark Web?

February 16, 2024

What Exactly is the Dark Web?
At its core, the dark web is a part of the internet that is not indexed by traditional search engines like Google.
Tech Center
How to Avoid Social Engineering Attacks

February 15, 2024

How to Avoid Social Engineering Attacks
In today’s digital era, we rely heavily on the use of modern technology. There is no doubt that the use of modern technologies has made our lives a lot easier, but it has many downsides as well. These innovative technologies have made us more vulnerable to social engineering attacks than ever before. \r\n
Tech Center
What is the Zero Trust Security Model?

February 14, 2024

What is the Zero Trust Security Model?
Discover how the Zero Trust Security Model is redefining cybersecurity by emphasizing verification across identity, devices, and networks.
Tech Center
Multi-Factor Authentication (MFA) Methods

February 13, 2024

Multi-Factor Authentication (MFA) Methods
Exploring the essentials of Multi-Factor Authentication (MFA) methods, discussing how they fortify online security across digital platforms.
Tech Center
Love in the Time of Cyber Threats: Romance Scams and Dating App Cybersecurity

February 13, 2024

Love in the Time of Cyber Threats: Romance Scams and Dating App Cybersecurity
As the digital attack surface expands, organizations and individuals worldwide face the nonstop threat of cyberattacks, phishing scams, and other cyber vulnerabilities. And with Valentine’s Day here, romance scams — especially ones originating online — are intensifying. With that in mind, SecurityScorecard’s researchers took a close look at the world of dating app security and romance scams to protect people—and their hearts—during Valentine’s Day. \r\n
Cyber Threat Intelligence
Ensuring Biometric Data Security: Protecting the Keys to Your Identity

February 9, 2024

Ensuring Biometric Data Security: Protecting the Keys to Your Identity
Biometric data security is critical. Let’s explore its significance, challenges, and strategies to protect digital identities.
Tech Center
Securing the Vault: Cybersecurity in the Financial Sector

February 8, 2024

Securing the Vault: Cybersecurity in the Financial Sector
In today’s digital world, online financial transactions have significantly improved people’s lives. They are easier and more secure compared to physical transactions. But with the increasing number of online transactions every day, the security aspect of these transactions cannot be overlooked. They should be highly secure so that people can trust that both their money and data is safe. \r\n
Tech Center
Cloud Security Best Practices That Actually Protect Your Business

February 8, 2024

Cloud Security Best Practices That Actually Protect Your Business
Cloud security posture management made simple. Learn best practices for workload protection, access control, and compliance across cloud platforms.
Tech Center
Cybersecurity For The Internet of Things (IoT)

February 8, 2024

Cybersecurity For The Internet of Things (IoT)
Let’s discuss IoT device security, exploring challenges, real-world scenarios, and future trends to safeguard our connected world.
Tech Center
How to Deal with Cyber Attacks Using the NIST Framework

February 8, 2024

How to Deal with Cyber Attacks Using the NIST Framework
The NIST Cybersecurity Framework was developed in collaboration with government agencies and the private sector, and is most commonly used by companies in the U.S.
Tech Center
How Can I Create a Strong Password? Best Practices for Staying Safe Online

February 8, 2024

How Can I Create a Strong Password? Best Practices for Staying Safe Online
Creating a strong password is of utmost importance to prevent attackers from gaining unauthorized access to online accounts, which could potentially result in reputational or financial loss.
Tech Center
Scorecarder Spotlight: Priya Thupili

February 8, 2024

Scorecarder Spotlight: Priya Thupili
Our series “Scorecarder Spotlight” showcases our talented employees and the incredible work they do. Meet Priya Thupili!
Scorecarder Spotlight
DDoS Attacks: What You Need To Know

February 6, 2024

DDoS Attacks: What You Need To Know
Uncover essential insights into DDoS attacks, their types, and effective prevention strategies to safeguard your digital domain effectively.
Tech Center
Hacker Subcultures: Unmasking the Motivations and Methods

February 5, 2024

Hacker Subcultures: Unmasking the Motivations and Methods
Explore hacker subcultures and their impact on cybersecurity, from ethical white hats to disruptive script kiddies, in this insightful read.
Tech Center