Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

What is 5G Network Security?

January 22, 2026

What is 5G Network Security?
The rollout of 5G networks represents one of the biggest shifts in wireless networking we’ve seen in decades. With promises of ultra-low latency, massive network capacity, and the ability to connect billions of Internet of Things devices, 5G is already powering everything from autonomous vehicles to smart cities. Read More
What is a CVE and Why is It Important?

January 22, 2026

What is a CVE and Why is It Important?
Every day, security teams face an overwhelming challenge. Thousands of cybersecurity vulnerabilities emerge across software systems, networks, and applications. How do you identify which security threats demand immediate attention? How do you communicate risks when everyone speaks a different language about security issues?  This is where… Read More
What Is Malware: Definition and Examples

January 22, 2026

What Is Malware: Definition and Examples
Every day, organizations face an invisible enemy that can strike without warning. Malicious software has become one of the most pressing security concerns for businesses of all sizes. Understanding what malware is and how it operates is no longer just an IT concern. It’s a business imperative that… Read More
Cyber Resilience in 2026: Why Supply Chains Are the New Front Line

January 21, 2026

Cyber Resilience in 2026: Why Supply Chains Are the New Front Line
The World Economic Forum’s Global Cybersecurity Outlook 2026 delivers a clear message for leaders across government and industry: cyber risk no longer lives inside the firewall. For the public sector, this reality is especially stark. Government missions increasingly depend on vendors, managed… Read More
What is API Security?

January 21, 2026

What is API Security?
API security refers to the practices, tools, and strategies organizations use to protect application programming interfaces from attacks, data breaches, and unauthorized access.  Application programming interfaces (APIs) power nearly everything we do online today. From checking your bank balance on a mobile app to ordering dinner… Read More
What Is Data Leakage

January 21, 2026

What Is Data Leakage
Data leakage occurs when sensitive information escapes an organization’s control, whether due to employee mistakes, software vulnerabilities, or intentional theft. Unlike a data breach where attackers forcefully break into systems, data leakage often occurs gradually through misconfigured systems, poor password hygiene, or inadequate data security protocols. Read More
What is SOX Compliance?

January 21, 2026

What is SOX Compliance?
Financial scandals rocked the early 2000s. Companies like Enron and WorldCom collapsed under the weight of massive accounting fraud, wiping out billions in shareholder value overnight. Investors lost confidence. The market needed accountability. Congress responded with legislation that would reshape corporate America forever. The… Read More
How Executive Order 14028 Is Strengthening Supply Chain Cybersecurity for the Public and Private Sector

December 23, 2025

How Executive Order 14028 Is Strengthening Supply Chain Cybersecurity for the Public and Private Sector
What Executive Order 14028 Really Requires of Agencies and Contractors Executive Order 14028 established updated cybersecurity expectations for federal agencies and their contractors. It marked a shift toward continuous risk visibility, emphasizing the need to verify supply chain relationships, strengthen cloud and software… Read More
SecurityScorecard In The News November 2025

December 19, 2025

SecurityScorecard In The News November 2025
Catch up on the latest TV appearances, podcast interviews, press coverage, industry commentary, and company news for SecurityScorecard in November 2025. Coverage highlights how SecurityScorecard is helping organizations better understand and manage cyber risk, with extensive global reporting on the SecurityScorecard STRIKE Threat Intelligence Team’s research into Operation… Read More
SecurityScorecard In The News Q1 2025

December 19, 2025

SecurityScorecard In The News Q1 2025
Catch up on the latest TV appearances, press coverage, research-driven reporting, and executive thought leadership from SecurityScorecard in Q1 2025. Coverage highlights how SecurityScorecard is helping organizations better understand and manage cyber risk, with expert perspectives on the accelerating impact of third-party and Nth-party breaches, software supply chain… Read More
SecurityScorecard In The News Q3 2025

December 19, 2025

SecurityScorecard In The News Q3 2025
Catch up on the latest TV appearances, podcast interviews, press coverage, industry commentary, and company news for SecurityScorecard from Q3 2025. Coverage highlights how SecurityScorecard is helping organizations better understand and manage cyber risk, with coverage featuring STRIKE Threat Intelligence team’s Black Hat report on the… Read More
SecurityScorecard In The News Q2 2025

December 19, 2025

SecurityScorecard In The News Q2 2025
Catch up on the latest press coverage, industry commentary, and company news for SecurityScorecard from Q2 2025. Coverage highlights how SecurityScorecard is helping organizations better understand and manage cyber risk, with expert perspectives on heightened global concern around supply chain cyber risk, third-party breaches, critical infrastructure threats, and… Read More
SecurityScorecard In The News October 2025

December 19, 2025

SecurityScorecard In The News October 2025
Catch up on the latest TV appearances, press coverage, industry commentary, and company news featuring SecurityScorecard from October 2025. Coverage highlights how SecurityScorecard is helping organizations better understand and manage cyber risk, with expert perspectives on the global AWS outage, supply chain cyberattacks, malicious use of AI, and… Read More
SecurityScorecard Awards and Recognitions in 2025

December 19, 2025

SecurityScorecard Awards and Recognitions in 2025
SecurityScorecard took center stage in 2025 with multiple industry recognitions affirming its leadership in supply chain cybersecurity, third-party risk management, and data-driven security ratings. These awards reflect SecurityScorecard’s impact across product innovation, threat intelligence, market leadership, and the application of AI to modern cyber risk management. Awards and… Read More
How to Automate Vendor Risk at Scale with the RSA Archer and SecurityScorecard Integration

December 15, 2025

How to Automate Vendor Risk at Scale with the RSA Archer and SecurityScorecard Integration
Scale Vendor Oversight with Real-Time Monitoring in Archer Managing thousands of third-party vendors is no longer a once-a-year project. GRC teams need scalable, real-time oversight and detailed risk intelligence, without growing headcount. The integration of SecurityScorecard with RSA Archer solves this by embedding objective cybersecurity ratings directly into… Read More
How to Automate Third-Party Risk with the LogicGate and SecurityScorecard Integration

December 15, 2025

How to Automate Third-Party Risk with the LogicGate and SecurityScorecard Integration
The Workflow Imperative in GRC Third-Party Risk Management (TPRM) often breaks down under manual steps, from email follow-ups and spreadsheet tracking to inconsistent responses. These delays cost Governance, Risk, and Compliance (GRC) teams time and visibility. The LogicGate Risk Cloud platform is specifically designed to meet this demand,… Read More
How to Outsmart Holiday Scammers This Shopping Season

December 12, 2025

How to Outsmart Holiday Scammers This Shopping Season
The Federal Trade Commission reports that consumers lost more than $12.5 billion to fraud in 2024 alone. That’s a 25% jump from the previous year. And here’s the thing that makes our security team cringe every November and December: a massive chunk of those losses happens during the… Read More
What Is HTTPS and Why Is It Essential for Cybersecurity?

December 12, 2025

What Is HTTPS and Why Is It Essential for Cybersecurity?
As organizations shift toward cloud-first and API-centric infrastructure, secure web browsing and HTTPS encryption must remain top priorities. HTTPS, or Hypertext Transfer Protocol Secure, continues to serve as the backbone of encrypted web communications between web browsers and web servers. The HTTPS protocol builds upon the standard HTTP… Read More
What Is an Exploit? Vulnerabilities and Threat Mitigation

December 12, 2025

What Is an Exploit? Vulnerabilities and Threat Mitigation
Every cybersecurity professional faces a constant battle against threats that target the weakest points in their digital infrastructure. While organizations invest heavily in defensive technologies, attackers continue to find new ways to bypass these protections using sophisticated techniques that turn software weaknesses into powerful weapons. What… Read More
What is a Prompt Injection Attack: What CISOs Need to Know

December 12, 2025

What is a Prompt Injection Attack: What CISOs Need to Know
As companies integrate AI-powered chatbots, automated assistants, and intelligent search tools into their workflows, they’re opening doors to a sophisticated category of attacks that traditional cybersecurity measures struggle to detect. A prompt injection attack represents one of the most critical AI security threats facing organizations today. Read More