Resources
Cybersecurity white papers, data sheets, webinars, videos and more
Resource Library
August 2, 2022
Was the Explosion at Freeport LNG a Result of a Russian Cyber Attack?
Executive Summary On June 8, an explosion–which some commentators hypothesized was the result of a Russian cyber attack–took place at Freeport LNG’s liquefied natural gas (LNG) export facility in Quintana, Texas. SecurityScorecard’s platform revealed a number of vulnerabilities an attacker could have exploited. SecurityScorecard researchers observed some traffic involving Freeport… Read More
STRIKE Team
July 22, 2022
New: SecurityScorecard Extension for Chrome
With the new SecurityScorecard Chrome Extension, you can automatically see the simple A-F security rating of the websites you visit, enabling you to evaluate the risk of the sites you visit before supplying your data to them.
Security Ratings
July 20, 2022
5 Steps to Selecting a Vendor Risk Management Framework
Understand the risk you take on with your third parties and limit your liability. Here are 5 steps you can take to selecting a risk management framework.
Tech Center
July 13, 2022
8 Best Practices for Securing the Internet of Things (IoT)
The Internet of Things (IoT) is an interconnected network of devices. Discover how your organization can improve your overall IoT security with these best practices.
Tech Center
July 13, 2022
What is Mobile Forensics? Definition, Processes, & Examples
The difference between a contained mobile security incident and a company-ending breach often comes down to one thing: how quickly you can get answers. Mobile device forensics techniques proven by every law enforcement agency worldwide can cut your incident response time in… Read More
Tech Center
June 24, 2022
Top 5 Incident Response Best Practices You Should Follow
Incident response refers to the collection of active measures taken during a breach in order to halt the attack and mitigate the damage. In this post, we discuss incident response and a handful of best practices to follow.
Tech Center
June 24, 2022
What is Digital Forensics? Everything You Need to Know: How It Supports Cybersecurity, Incident Response, and Compliance
Digital forensics is a branch of forensics that focuses on finding, preserving, documenting, and analyzing any criminal evidence stored on digital devices.
Tech Center
June 23, 2022
Incident Response vs. Disaster Recovery: Key Differences
While they both fight the same threats to protect your business from a security threat and breach, incident response vs. disaster recovery plans have their differences. Learn more.
Tech Center
June 22, 2022
What is Vendor Tiering? Tips to Improve Your Vendor Risk Management
Vendor tiering is the process of identifying, analyzing, and classifying vendors based on their security risks. Learn how your business can improve your vendor risk management.
Tech Center
June 20, 2022
The Value of Communicating Risk Meaningfully Across the Business
While cybersecurity might be under the umbrella of IT, make no mistake: a breach will impact the entire business, making it the entire organization’s responsibility to be able to understand and take action on risk.\r\n\r\nYour organization needs to have a holistic view of risk that can enable technical and business conversations about cyber risk. By understanding not just the nuts and bolts of an exploit, but the impact it can have on employees, customers, and revenue, security experts and business leaders alike can then prioritize actions, budgets, and initiatives.
Tech Center
May 25, 2022
5 Ways to Effectively Prevent Data Leakage
Explore how you can stop data leakage with a solution that identifies and combats vulnerabilities inherent within your business. Learn more.
Tech Center
May 25, 2022
KillNet Utilizes CC-Attack: A Quick & Dirty DDoS Method
SecurityScorecard’s analysis of CC-Attack reveals the script automates the process of using open proxy servers to relay attacks.
Cyber Threat Intelligence
STRIKE Team
March 7, 2022
Understanding the Basics of Cyber Insurance: What You Need to Know
Learn more about the basics of cyber insurance and how it can — and can’t — help your organization recover from a cyber incident.
Cyber Insurance
Executive Viewpoint
Tech Center
March 2, 2022
What is Cyber Hygiene? Definition, Benefits, & Best Practices
Cyber hygiene is the collection of regular best practices that an organization undertakes to keep its network and data safe and secure. Learn all about it.
Tech Center
February 16, 2022
25 Common Types of Malware & How To Identify Them
Explore the several types of malware and the traits that will help your organization identify each. Read more on SecurityScorecard’s blog.
Tech Center
February 7, 2022
6 Benefits of Effective Risk Management in Cybersecurity
Having an effective cybersecurity risk management program is much more than an option. Rather, it’s a crucial component of business continuity. Explore the top benefits now.
Tech Center
February 2, 2022
What is a Botnet Attack? 5 Ways to Prevent It
A botnet attack happens when a group of devices is infected by malware that is under the control of a hacker. Explore ways to prevent botnet attacks from happening now.
Tech Center
January 31, 2022
What is Third Party Due Diligence? What You Should Know
Due diligence is the investigation that a person or business is expected to take on before entering into an agreement with a third-party. Learn more.
Tech Center
January 3, 2022
How to Measure Risk Management Performance: KPI & Metrics
Cybersecurity professionals are facing an unprecedented amount of scrutiny. Not only are they responsible for securing and protecting their organizations, but they also need to prove that their ideas and strategies for doing so have a meaningful impact. This can be hard when the threat landscape is constantly changing and… Read More
Security Ratings
Tech Center
December 6, 2021
First-Party vs Third-Party Cyber Insurance: What’s the Difference?
First-party and third-party cyber insurance work to protect your business from serious financial and reputational damage that may result from a data breach. Learn more.
Cyber Insurance
Executive Viewpoint
Tech Center
November 24, 2021
Guide to Performing a Data Risk Assessment
Check out this guide to performing a data risk assessment that explains what it is, why it’s important, and how to engage in one. Read more
Tech Center