Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

Why India Is Emerging as a Third-Party Breach Hotspot

February 5, 2026

Why India Is Emerging as a Third-Party Breach Hotspot
SecurityScorecard experts analyzed why 52.6% of Indian vendors experienced at least one third-party breach in the past year in a recent webinar. India has become one of the most critical engines of the global digital economy and one of the most targeted.
What is a SOC 2 Compliance Checklist?

February 4, 2026

What is a SOC 2 Compliance Checklist?
Use this SOC 2 compliance checklist to prepare for your audit, meet requirements, and maintain continuous compliance. Expert guidance for security leaders.
What Are Moltbot and Moltbook and What Happens When Agentic AI Assistants Scale Without Security

February 3, 2026

What Are Moltbot and Moltbook and What Happens When Agentic AI Assistants Scale Without Security
Moltbot AI assistants and their social media platform Moltbook have sparked AGI fears in recent days, but the real risk is access. Learn what Moltbook and Moltbot are (now OpenClaw and formerly known as Clawdbot), why it’s not artificial general intelligence (AGI), and how to reduce security exposure.
What Is Network Cloud Security?

February 3, 2026

What Is Network Cloud Security?
Learn what network cloud security is, why traditional approaches fall short, and best practices for protecting your cloud infrastructure from security threats.
Odyssey 2026 Recap: Building Continuous Supply Chain Resilience in an Era of Persistent Threats

February 3, 2026

Odyssey 2026 Recap: Building Continuous Supply Chain Resilience in an Era of Persistent Threats
SecurityScorecard’s Odyssey 2026 customer conference in Miami brought CISOs together to examine continuous, threat-informed supply chain security and the shift from periodic assessments to real-time risk operations.
What Is Cyber Incident Response and Why It Matters

February 2, 2026

What Is Cyber Incident Response and Why It Matters
Learn what cyber incident response is, the steps in the incident response lifecycle, and how to build effective incident response teams and playbooks.
Critical Update: What Security Leaders Need to Know Right Now About the Future of CISA and Threat Sharing

January 23, 2026

Critical Update: What Security Leaders Need to Know Right Now About the Future of CISA and Threat Sharing
Discover how the expiration of the Cybersecurity Information Sharing Act (CISA 2015) disrupted threat intelligence, weakened national security, and widened AI-driven attack gaps. SecurityScorecard’s Mike Centrella and Dr. Aleksandr Yampolskiy explain what’s at stake as the January 2026 deadline nears amid a potential government shutdown.
What is a Parked Domain?

January 21, 2026

What is a Parked Domain?
Learn what is a parked domain, why people park domains, and the security risks they create. Discover how to protect your attack surface from hidden threats.
Cyber Resilience in 2026: Why Supply Chains Are the New Front Line

January 21, 2026

Cyber Resilience in 2026: Why Supply Chains Are the New Front Line
The World Economic Forum’s Global Cybersecurity Outlook 2026 delivers a clear message for leaders across government and industry: cyber risk no longer lives inside the firewall.
What Is a Brute Force Attack and How to Prevent It

January 17, 2026

What Is a Brute Force Attack and How to Prevent It
What is a brute force attack, how attackers use password cracking methods to gain access, and proven strategies to protect yourself.
What is SOX Compliance?

January 13, 2026

What is SOX Compliance?
Discover how SOX compliance protects financial reporting through internal controls, audits, and cybersecurity measures for public companies.
What Is Data Leakage

January 6, 2026

What Is Data Leakage
Data leakage occurs when sensitive information escapes an organization’s control, whether due to employee mistakes, software vulnerabilities, or intentional theft.
What is API Security?

December 30, 2025

What is API Security?
Learn what API security is, common vulnerabilities like broken authentication, and essential techniques to protect your APIs from evolving threats.
How Executive Order 14028 Is Strengthening Supply Chain Cybersecurity for the Public and Private Sector

December 23, 2025

How Executive Order 14028 Is Strengthening Supply Chain Cybersecurity for the Public and Private Sector
Executive Order 14028 emphasizes Zero Trust, cloud adoption, and improved threat sharing across agencies and vendors. Learn how this EO reshapes supply chain defense and how SecurityScorecard supports continuous monitoring and risk intelligence.
SecurityScorecard Awards and Recognitions in 2025

December 19, 2025

SecurityScorecard Awards and Recognitions in 2025
SecurityScorecard is recognized as a leader in third-party risk management and supply chain security. Explore the awards and recognitions the company received in 2025 for supply chain cyber risk management, AI-driven security innovation, executive leadership, and third-party risk intelligence.
What Is Malware: Definition and Examples

December 16, 2025

What Is Malware: Definition and Examples
What is malware? Learn how malicious software infiltrates networks, the types of threats your organization faces, and proven defenses to protect your business.
How to Automate Vendor Risk at Scale with the RSA Archer and SecurityScorecard Integration

December 15, 2025

How to Automate Vendor Risk at Scale with the RSA Archer and SecurityScorecard Integration
Learn how the RSA Archer and SecurityScorecard integration automates vendor monitoring, triggers workflows on score changes, and scales GRC oversight in real time.
How to Automate Third-Party Risk with the LogicGate and SecurityScorecard Integration

December 15, 2025

How to Automate Third-Party Risk with the LogicGate and SecurityScorecard Integration
Learn how GRC teams use LogicGate workflows and SecurityScorecard ratings together to automate vendor tiering, trigger remediation, and prove risk reduction.
How to Outsmart Holiday Scammers This Shopping Season

December 12, 2025

How to Outsmart Holiday Scammers This Shopping Season
Let’s break down why this time of year is so dangerous and how you can shop online without falling victim to holiday scams.
Operation WrtHug Exposed: The Router Hack You Need to Know

December 10, 2025

Operation WrtHug Exposed: The Router Hack You Need to Know
SecurityScorecard STRIKE threat intelligence researchers uncovered a suspected China-backed campaign by chasing an extremely unusual 100‑year certificate that kept appearing on routers. Here is how the research team hunted the signal, what they found, and the practical steps security teams can take to protect themselves.
CISA’s New AI Guidance: The Leadership Imperative for OT Supply Chain Security

December 9, 2025

CISA’s New AI Guidance: The Leadership Imperative for OT Supply Chain Security
CISA’s new AI guidance raises the bar for OT supply chain security. Learn what critical infrastructure leaders must do to vet AI vendors, govern risk, and continuously validate cyber hygiene.