Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

What is a Cybersecurity Assessment?

January 3, 2024

What is a Cybersecurity Assessment?
A cybersecurity assessment helps security teams determine whether or not an organization is properly prepared to protect its assets against a range of threats. Learn more.
Tech Center
20 Cybersecurity Metrics & KPIs to Track in 2025

January 2, 2024

20 Cybersecurity Metrics & KPIs to Track in 2025
Explore the top cybersecurity metrics for 2025. Learn how to measure risk, performance, and vendor exposure across your organization and supply chain.\r\n
Security Ratings
Tech Center
How to Perform A Cybersecurity Risk Analysis in 2024

January 2, 2024

How to Perform A Cybersecurity Risk Analysis in 2024
Identify, manage, and safeguard data, and assets that could be vulnerable to a cyberattack. Learn how to perform a cyber security risk analysis.
Tech Center
In-Depth Review: How SecurityScorecard Stacks Up Against UpGuard in 2024

December 23, 2023

In-Depth Review: How SecurityScorecard Stacks Up Against UpGuard in 2024
In the dynamic world of cybersecurity, choosing the right platform can be pivotal for an organization’s digital safety. As we delve into 2024, two major players, SecurityScorecard and UpGuard, continue to make waves. This in-depth review compares these two companies and highlights how SecurityScorecard’s offerings often outshine those of… Read More
Security Ratings
Applying the Churchill Knowledge Audit to Cybersecurity: The Importance of Security Ratings

December 19, 2023

Applying the Churchill Knowledge Audit to Cybersecurity: The Importance of Security Ratings
As a CISO, I am frequently pitched by companies promising to transform or revolutionize my job. I shrug off most pitches because they don’t add any value to what I’m doing. But every once in a while, an organization comes along that offers something new.
Executive Viewpoint
Optimizing Incident Response with Advanced Threat Intelligence

December 14, 2023

Optimizing Incident Response with Advanced Threat Intelligence
Here’s how modern threat intelligence tools can refine and improve an organization’s incident response strategies.
Cyber Threat Intelligence
Tech Center
2025 Guide to Completing a Vendor Risk Management Questionnaire

December 7, 2023

2025 Guide to Completing a Vendor Risk Management Questionnaire
Vendor risk management is increasingly crucial in 2025 as enterprises integrate more cloud-based solutions into their IT ecosystems. With this shift comes greater compliance risks, making the verification of vendors’ security controls and regular security audits essential. Understanding and managing these risks effectively requires ongoing communication with… Read More
Tech Center
C-Suite Liability & Cybersecurity: Navigating a New Era of Enforcement

November 22, 2023

C-Suite Liability & Cybersecurity: Navigating a New Era of Enforcement
It’s well established that corporate directors have fiduciary “duties of care” to protect their companies against major risks and compliance failures. Only recently have courts clarified that these duties now extend to the C-Suite — CEOs, CISOs, GCs and other key executives now face personal liability for failing to safeguard their companies.
Executive Viewpoint
Decoding the Boardroom: A Fortune 500 CISO’s Guide to Winning Hearts and Budgets

November 20, 2023

Decoding the Boardroom: A Fortune 500 CISO’s Guide to Winning Hearts and Budgets
It’s imperative for CISOs to learn how to speak the language of their boards and stakeholders, oh by the way…it’s not cyber risk probability! Board members and business stakeholders prefer economic terminology over tech talk.
Executive Viewpoint
Security Ratings
What are Tabletop Exercises?

November 9, 2023

What are Tabletop Exercises?
One of the best ways to prepare your organization for a security incident and reduce the cost of a breach is by putting your incident response plan to the test with tabletop exercises. Here we’ll explore the objectives of tabletop exercises and how they can improve your organization’s security posture.
Services
Tech Center
SecurityScorecard Achieves FedRAMP® ‘Ready’ Designation

October 24, 2023

SecurityScorecard Achieves FedRAMP® ‘Ready’ Designation
U.S. federal agencies positioned to adopt A to F letter-grade rating system
Public Sector
Security Ratings
SecurityScorecard Cybersecurity Data Incorporated into S&P Global Market Intelligence’s Newly Launched Supplier Risk Indicator™

October 12, 2023

SecurityScorecard Cybersecurity Data Incorporated into S&P Global Market Intelligence’s Newly Launched Supplier Risk Indicator™
Discover how S&P Global Market Intelligence’s Supplier Risk Indicator™ revolutionizes business relationships by assessing financial resilience, conduct, and information security. Secure your supply chain now.
Services
Zero‑Day Attack Prevention: How to Prepare

October 11, 2023

Zero‑Day Attack Prevention: How to Prepare
Learn how to prevent zero‑day attacks with hardening, detection prep, virtual patching, and a 24–72 hour response checklist, even before a patch exists.
Tech Center
Qualitative vs. Quantitative Cybersecurity Risk Assessment: What’s the Difference?

September 28, 2023

Qualitative vs. Quantitative Cybersecurity Risk Assessment: What’s the Difference?
Formulating a cybersecurity risk assessment methodology is an essential part of building a robust information security program to identify key information assets and their value to the organization. By using this data, it is then possible for management to determine whether their existing security measures are adequate and investigate its risk profile.\r\n\r\nThere are two primary risk assessment methodologies: qualitative and quantitative risk assessments. But to build an effective IT security risk assessment methodology, you will need to incorporate both quantitative and qualitative approaches to paint an accurate picture of risk. Let’s take a closer look.
Tech Center
What is the Cost of Cyber Liability Insurance?

September 20, 2023

What is the Cost of Cyber Liability Insurance?
The cost of cyber liability insurance can vary based on factors such as business size, industry, risk profile, and coverage needs.
Cyber Insurance
Executive Viewpoint
Tech Center
Using a Standardized Approach for Measuring Cybersecurity in Government

September 12, 2023

Using a Standardized Approach for Measuring Cybersecurity in Government
One of the highlights of last week’s annual Billington CyberSecurity Summit was a fireside chat on Friday with Anne Neuberger, deputy national security adviser for cyber and emerging technology. In her talk, Neuberger stressed the importance of not only keeping our critical infrastructure secure but harnessing an accurate and repeatable way of measuring it to ensure progress.
Public Sector
The Top 7 Cyberattacks on U.S. Government: A closer look at the evolving landscape of cybersecurity

September 9, 2023

The Top 7 Cyberattacks on U.S. Government: A closer look at the evolving landscape of cybersecurity
Cyberattacks are an increasingly significant threat to governments worldwide. This blog post examines some of the top cyberattacks on US government.
Public Sector
Tech Center
6 Myths About Cybersecurity Ratings (and 1 Truth): The Current State Of The Cybersecurity Ratings Industry And Where It Can Improve

August 15, 2023

6 Myths About Cybersecurity Ratings (and 1 Truth): The Current State Of The Cybersecurity Ratings Industry And Where It Can Improve
Cybersecurity ratings are a valuable asset in defending your organization. Learn about popular cybersecurity myths and what security ratings can do for you.
Security Ratings
Top 5 Security Vulnerabilities of 2023

August 7, 2023

Top 5 Security Vulnerabilities of 2023
Why 2023 is a year of ‘digital forest fires’: New Attack Surface Intelligence Research from SecurityScorecard 2023 is a year of “digital forest fires.” The MOVEit and the Barracuda Networks’ email supply chain attacks underscore the massive butterfly effect a single software flaw can have on the threat landscape. Supply… Read More
Cyber Threat Intelligence
Supply Chain Cyber Risk
3 Takeaways: New SEC Cyber Risk Disclosure Rules

July 27, 2023

3 Takeaways: New SEC Cyber Risk Disclosure Rules
Blog: New rules require a detailed assessment of supply chain and organizational resilience
Services
What is Cyber Threat Hunting?

July 12, 2023

What is Cyber Threat Hunting?
Master cyber threat hunting with expert techniques and tools to find hidden threats before they cause data breaches.
Cyber Threat Intelligence
Tech Center