SecurityScorecard Blog
Read the latest blog posts published weekly.
-
BlogCalculating the ROI of Security Ratings.
August 24, 2020It can be difficult to show leadership metrics that prove that you’re saving money because of incidents that haven’t happened. Fortunately, there are a number of qualitative ways to prove to your board and investors that your investment in security ratings is saving your paying off.
More DetailsSecurity Ratings -
Blog, Learning CenterThe CISO’s Guide to Reporting Cybersecurity to the Board
April 6, 2020Being able to effectively report on cybersecurity is a key component to every CISOs job. Learn how CISOs can ensure that their board presentations are beneficial.
More DetailsTech Center -
Blog, Learning CenterWhat is Cyber Threat Intelligence? A Complete Guide
March 12, 2020Continued cyber threat intelligence monitoring has become imperative to business success. Learn more about cyber threat intelligence and its various use cases.
More DetailsCyber Threat Intelligence, Tech Center -
BlogImportance of Reputational Risk Monitoring & Management
March 10, 2020News headlines about data breaches have increased customer awareness and concern around data privacy and security. Today, customers - both in business-to-business or business-to-customer situations - make their purchasing decisions based on cybersecurity.
More DetailsJeff Aldorisio
-
Blog, Learning Center4 Ways to Optimize Your Third Party Cyber Risk Management (TPCRM) Program
January 6, 2020Managing your TPCRM program can be a tedious, time-consuming task, yet it is a critical one. Learn 4 ways to optimize your TPCRM program.
More DetailsSupply Chain Cyber Risk, Tech Center -
BlogA Shared Language to Improve Ecosystem Cybersecurity Risks
August 7, 2018Security professionals need to find a way to bridge the knowledge and skills gap by creating a shared vocabulary that fosters cybersecurity improvements across an entire ecosystem of organizations.
More DetailsCyber Threat Intelligence -
BlogThe Ultimate Vendor Risk Management Checklist
May 9, 2018Digital transformation increases the number of vendors that your organization incorporates into its IT ecosystem. Check out these 15 rules that you can use as a vendor risk management checklist.
More DetailsAttack Surface Management, Tech Center -
Blog, Learning CenterEnsuring Biometric Data Security: Protecting the Keys to Your Identity
Biometric data security is critical. Let's explore its significance, challenges, and strategies to protect digital identities.
More DetailsTech Center -
Blog, Learning CenterHow Brand Protection Software Shields Your Reputation
Safeguard your brand's online reputation with powerful protection software, defending against cyber threats and maintaining trust.
More DetailsTech Center -
BlogWhat is Supply Chain Detection and Response (SCDR)?
March 21, 2025Supply Chain Detection and Response (SCDR) is a new cybersecurity framework that identifies, prioritizes, and remediates vulnerabilities across an organization's vendor ecosystem. Its purpose is preventing supply chain attacks from threat actors and mitigating concentration risk when critical providers experience outages or security failures.
More DetailsGian Calvesbert
SCDR -
BlogSecurityScorecard’s Partnership with the TSA Helping to Secure the Nation’s Critical Infrastructure
May 16, 2023As part of our continued commitment to making the world a safer place, SecurityScorecard recently partnered with the Transportation Security Administration (TSA). This partnership will enable the agency to more accurately monitor and assess the cyber health of the nation’s pipeline, rail, and aviation transportation systems.
More Details -
BlogSecurityScorecard Discovers new botnet, ‘Zhadnost,’ responsible for Ukraine DDoS attacks
SecurityScorecard (SSC) has identified three separate DDoS attacks which all targeted Ukrainian government and financial websites leading up to and during Russia’s invasion of Ukraine. Details of these DDoS attacks have not yet been publicly identified.
More Details