Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

Odyssey.conf 2024: Navigating the Future of Supply Chain Cybersecurity with SecurityScorecard

February 5, 2024

Odyssey.conf 2024: Navigating the Future of Supply Chain Cybersecurity with SecurityScorecard
Key takeaways from Odyssey.conf 2024 with insights on cybersecurity leadership, innovative risk management, and the future of AI in security.
Executive Viewpoint
Bolstering Cyber Resilience in the US Water Sector: A Call to Action

February 5, 2024

Bolstering Cyber Resilience in the US Water Sector: A Call to Action
On February 6, 2024, the House Homeland Security Committee will hold a hearing on securing US water systems from cyberattacks. Following last year’s widely publicized attack on the municipal water system in Aliquippa, Pennsylvania, Congress, the Cybersecurity and Infrastructure Security Agency (CISA), and industry leaders have rightly increased their focus on the unique risks facing water systems across the country. Tomorrow’s hearing follows a similar oversight hearing conducted last week in the House Energy and Commerce Committee.\r\n
Executive Viewpoint
SecurityScorecard vs UpGuard: Which Delivers Better Cyber Risk Management in 2024?

February 2, 2024

SecurityScorecard vs UpGuard: Which Delivers Better Cyber Risk Management in 2024?
A comprehensive comparison of SecurityScorecard and UpGuard for cyber risk management in 2024, focusing on advanced features and efficacy.
Tech Center
SecurityScorecard introduces new partner certifications

February 2, 2024

SecurityScorecard introduces new partner certifications
New program educates and inspires partners to consolidate cybersecurity outcomes with the SecurityScorecard platform
Supply Chain Cyber Risk
From Confusion to Clarity: Red Sift Breaks Down Google and Yahoo’s Email Security Requirements

February 1, 2024

From Confusion to Clarity: Red Sift Breaks Down Google and Yahoo’s Email Security Requirements
Understand how to comply with Google and Yahoo’s new email security requirements and ensure your organization’s emails are delivered effectively. Discover how SecurityScorecard can help.
Supply Chain Cyber Risk
Decoding Cyber Security Innovations with SecurityScorecard CEO Alex Yampolskiy

February 1, 2024

Decoding Cyber Security Innovations with SecurityScorecard CEO Alex Yampolskiy
SecurityScorecard CEO Aleksandr Yampolskiy sat down with NightDragon CEO Dave DeWalt and unveiled his deep-rooted passion for cybersecurity.
Executive Viewpoint
SecurityScorecard Returns to the World Economic Forum’s Annual Meeting: Our Top 5 Insights

January 25, 2024

SecurityScorecard Returns to the World Economic Forum’s Annual Meeting: Our Top 5 Insights
Last week, SecurityScorecard was invited back to participate in the World Economic Forum’s Annual Meeting in Davos, Switzerland. It was a tremendous honor and, once again, we were the only security ratings company present (and one of the few cybersecurity companies). \r\n
Executive Viewpoint
The Evolution of CISOs and Security Ratings

January 25, 2024

The Evolution of CISOs and Security Ratings
Just like security ratings, the role of the CISO continues to evolve and they’ve had to become more strategic at prioritizing threats and vulnerabilities, especially in the wake of the SEC charges against SolarWinds and their CISO for defrauding investors.
Executive Viewpoint
Security Ratings
Leveraging Collaboration and Transparency: How CISOs Can Comply With New SEC Regulations

January 25, 2024

Leveraging Collaboration and Transparency: How CISOs Can Comply With New SEC Regulations
As we kick off 2024, CISOs at public companies will certainly be thinking of new regulations from the U.S. Securities and Exchange Commission (SEC) on security incident reporting, effective December 15, 2023. The new regulations demand unprecedented transparency and collaboration from CISOs. Open communication with the C-Suite and third-party partners will be a critical tool for maintaining compliance with the SEC’s new rules.\r\n
Services
Introducing SecurityScorecard MAX

January 25, 2024

Introducing SecurityScorecard MAX
Introducing SecurityScorecard MAX: Elevate your supply chain cyber risk management with our comprehensive, AI-driven solution. MAX combines expert insights and advanced technology to identify, prioritize, and resolve critical vulnerabilities in your vendor ecosystem. Protect your enterprise from emerging threats and ensure operational efficiency with MAX’s fully managed service, tailored for both Fortune 500 companies and growing businesses. Discover how MAX transforms cybersecurity strategy, offering collective defense and proactive services like penetration testing. Take your supply chain cyber risk to the MAX with SecurityScorecard.
Cyber Threat Intelligence
Services
Introducing the Cyber Resilience Scorecard: SecurityScorecard Finds Global Cyber Risk and GDP Closely Linked

January 15, 2024

Introducing the Cyber Resilience Scorecard: SecurityScorecard Finds Global Cyber Risk and GDP Closely Linked
SecurityScorecard has published the first Cyber Resilience Scorecard, offering leaders and decision-makers a comprehensive and global view of global cyber risk. SecurityScorecard identified a strong correlation between a country’s cyber risk exposure and GDP, which underscores that a nation’s economic prosperity is deeply intertwined with its ability to navigate the complex landscape of cyber threats.
Cyber Threat Intelligence
Threat Intelligence Research: Volt Typhoon Compromises 30% of Cisco RV320/325 Devices in 37 Days

January 11, 2024

Threat Intelligence Research: Volt Typhoon Compromises 30% of Cisco RV320/325 Devices in 37 Days
The SecurityScorecard Threat Research, Intelligence, Knowledge, and Engagement (STRIKE) Team has been investigating covert infrastructure linked to Volt Typhoon, a state-sponsored threat actor group believed to act on behalf of the People’s Republic of China. The group conducts multiple types of cyberattacks, but its use of compromised small office and home office (SOHO) equipment such as routers and firewalls is a recurring theme.
Cyber Threat Intelligence
Vendor Risk Management vs Third Party Risk Management vs Enterprise Risk Management: What’s the Difference?

January 10, 2024

Vendor Risk Management vs Third Party Risk Management vs Enterprise Risk Management: What’s the Difference?
Third-Party, Vendor, and Enterprise Risk Management are often used interchangeably, but they are not always the same. Learn which is right for your business.
Tech Center
7 Incident Response Metrics and How to Use Them

January 10, 2024

7 Incident Response Metrics and How to Use Them
A robust incident response plan provides quantitative data. Check out these seven incident response metrics and how to use them.
Tech Center
SecurityScorecard 10 Risk Factors Explained

January 10, 2024

SecurityScorecard 10 Risk Factors Explained
Trust begins with transparency. Check out SecurityScorecard’s ten risk factors, which are explained in an easy-to-understand manner that enables business and IT leaders to create meaningful conversations around cybersecurity risk and compliance.
Tech Center
Introducing Security Ratings for Telecommunications, Internet Service Providers, and Cloud Providers: Collaborating on enhancements with industry leaders

January 9, 2024

Introducing Security Ratings for Telecommunications, Internet Service Providers, and Cloud Providers: Collaborating on enhancements with industry leaders
Telecommunications, Internet Service Providers, and Cloud Providers are some of the most critical sectors on the planet. But they are also prime targets for nation-state attacks and other threat actor groups. And their reliance on vast networks of third-party vendors, partners, and service providers creates a need for a comprehensive cybersecurity approach tailored specifically to the sector.
Security Ratings
8 Types of Vendor Risks That Are Important to Monitor in 2025

January 8, 2024

8 Types of Vendor Risks That Are Important to Monitor in 2025
Discover how to manage vendor risk by understanding and monitoring various threats, ensuring your business stays secure from third-party vulnerabilities.
Tech Center
What Is Cybersecurity Risk and How Do You Manage It in 2025?

January 5, 2024

What Is Cybersecurity Risk and How Do You Manage It in 2025?
Explore what cybersecurity risk means in 2025 and how organizations can effectively assess, mitigate, and monitor cyber threats across their digital and third-party ecosystems
Tech Center
2025 Third-Party Vendor Risk Management in the Financial Industry

January 5, 2024

2025 Third-Party Vendor Risk Management in the Financial Industry
With an established third-party risk management program, financial organizations are better able to identify and address vendor cyber risk. Learn more.
Tech Center
What is Cyber Attack Insurance? Best Practices for Protection

January 5, 2024

What is Cyber Attack Insurance? Best Practices for Protection
Cyber attack insurance is increasingly essential to protect your organization from cyber threats and their consequences. Learn more.
Cyber Insurance
Executive Viewpoint
Tech Center
The Most Important Security Metrics to Maintain Compliance: Best Practices for Prioritizing Cyber Resilience

January 4, 2024

The Most Important Security Metrics to Maintain Compliance: Best Practices for Prioritizing Cyber Resilience
Security metrics are a great way to ensure your organization is meeting industry standards. Here are a few key performance indicators to track for maintaining compliance.
Security Ratings
Tech Center