
SecurityScorecard Blog
Read the latest blog posts published weekly.
-
Blog
What is Residual Risk in Cybersecurity?
August 18, 2025Why perfect security is impossible. Understand residual risk cybersecurity and learn to manage what remains after all controls are in place.
More Details -
Blog
SQL Injection in Cyber Security Prevention Guide
August 18, 2025Learn how SQL injection in cyber security threatens your data. Discover prevention strategies, attack types, and best practices to secure web applications.
More Details -
Blog
Red Team Cybersecurity: Complete Guide to Red Team Testing
August 18, 2025Learn what red teaming is, methodology, process, and importance in cybersecurity. Expert insights on red team testing and exercises.
More Details -
Blog, Learning Center, STRIKE
From the Depths of the Shadows: IRGC and Hacker Collectives Of The 12-Day War
August 5, 2025From reconnaissance to propaganda to payloads, this is how Iran’s digital foot soldiers mobilized across borders and platforms during the war with Israel in June 2025.
More DetailsSTRIKE Team -
Blog
Scorecarder Spotlight: Minh Pham
August 1, 2025Our “Scorecarder Learning & Development Spotlight” series showcases our talented, driven employees, the incredible work they do, and their quest to continue their development as lifelong learners.
More DetailsScorecarder Spotlight -
Blog
Why Continuous Monitoring Is Replacing Point-in-Time Audits for Compliance
July 9, 2025More DetailsCompliance -
Blog
Scorecarder Spotlight: Isabella Dorado Burbano
July 1, 2025Our “Scorecarder Learning & Development Spotlight” series showcases our talented, driven employees, the incredible work they do, and their quest to continue their development as lifelong learners.
More DetailsScorecarder Spotlight -
Blog
What is DNSSEC and Why Is It Important?
June 30, 2025Understand how DNSSEC secures the domain name system with cryptographic methods to verify the authenticity of DNS records and boost DNS security.
More Details -
Blog
What is a Whaling Attack in Cybersecurity?
June 30, 2025What is a whaling attack? See how phishing attacks aimed at executives and whaling attacks work, and how cybercriminals steal sensitive information.
More Details -
Blog
What is a Cyber Attack? Types and Preventive Measures
June 30, 2025Learn what is a cyber attack, explore common types like ransomware and phishing, understand financial impacts, and discover prevention strategies.
More Details -
Blog, Learning Center, STRIKE
Unmasking A New China-Linked Covert ORB Network: Inside the LapDogs Campaign
June 23, 2025SecurityScorecard’s STRIKE team uncovered a new China-Nexus ORB Network targeting the United States and Southeast Asia. Read the report to gain an in-depth look at the LapDogs ORB network, its custom malware, and its role in cyberespionage.
More DetailsSTRIKE Team -
Blog, Learning Center
What Are Proactive Ransomware Prevention Strategies for 2025?
June 3, 2025Ransomware threats are evolving fast. This guide explores the most effective prevention strategies for 2025, from zero trust to supply chain resilience.
More DetailsAttack Surface Management, Tech Center