Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

Was the Explosion at Freeport LNG a Result of a Russian Cyber Attack?

August 2, 2022

Was the Explosion at Freeport LNG a Result of a Russian Cyber Attack?
Executive Summary On June 8, an explosion–which some commentators hypothesized was the result of a Russian cyber attack–took place at Freeport LNG’s liquefied natural gas (LNG) export facility in Quintana, Texas. SecurityScorecard’s platform revealed a number of vulnerabilities an attacker could have exploited. SecurityScorecard researchers observed some traffic involving Freeport… Read More
STRIKE Team
New: SecurityScorecard Extension for Chrome

July 22, 2022

New: SecurityScorecard Extension for Chrome
With the new SecurityScorecard Chrome Extension, you can automatically see the simple A-F security rating of the websites you visit, enabling you to evaluate the risk of the sites you visit before supplying your data to them.
Security Ratings
5 Steps to Selecting a Vendor Risk Management Framework

July 20, 2022

5 Steps to Selecting a Vendor Risk Management Framework
Understand the risk you take on with your third parties and limit your liability. Here are 5 steps you can take to selecting a risk management framework.
Tech Center
8 Best Practices for Securing the Internet of Things (IoT)

July 13, 2022

8 Best Practices for Securing the Internet of Things (IoT)
The Internet of Things (IoT) is an interconnected network of devices. Discover how your organization can improve your overall IoT security with these best practices.
Tech Center
What is Mobile Forensics? Definition, Processes, & Examples

July 13, 2022

What is Mobile Forensics? Definition, Processes, & Examples
The difference between a contained mobile security incident and a company-ending breach often comes down to one thing: how quickly you can get answers. Mobile device forensics techniques proven by every law enforcement agency worldwide can cut your incident response time in… Read More
Tech Center
Top 5 Incident Response Best Practices You Should Follow

June 24, 2022

Top 5 Incident Response Best Practices You Should Follow
Incident response refers to the collection of active measures taken during a breach in order to halt the attack and mitigate the damage. In this post, we discuss incident response and a handful of best practices to follow.
Tech Center
What is Digital Forensics? Everything You Need to Know: How It Supports Cybersecurity, Incident Response, and Compliance

June 24, 2022

What is Digital Forensics? Everything You Need to Know: How It Supports Cybersecurity, Incident Response, and Compliance
Digital forensics is a branch of forensics that focuses on finding, preserving, documenting, and analyzing any criminal evidence stored on digital devices.
Tech Center
Incident Response vs. Disaster Recovery: Key Differences

June 23, 2022

Incident Response vs. Disaster Recovery: Key Differences
While they both fight the same threats to protect your business from a security threat and breach, incident response vs. disaster recovery plans have their differences. Learn more.
Tech Center
What is Vendor Tiering? Tips to Improve Your Vendor Risk Management

June 22, 2022

What is Vendor Tiering? Tips to Improve Your Vendor Risk Management
Vendor tiering is the process of identifying, analyzing, and classifying vendors based on their security risks. Learn how your business can improve your vendor risk management.
Tech Center
The Value of Communicating Risk Meaningfully Across the Business

June 20, 2022

The Value of Communicating Risk Meaningfully Across the Business
While cybersecurity might be under the umbrella of IT, make no mistake: a breach will impact the entire business, making it the entire organization’s responsibility to be able to understand and take action on risk.\r\n\r\nYour organization needs to have a holistic view of risk that can enable technical and business conversations about cyber risk. By understanding not just the nuts and bolts of an exploit, but the impact it can have on employees, customers, and revenue, security experts and business leaders alike can then prioritize actions, budgets, and initiatives.
Tech Center
5 Ways to Effectively Prevent Data Leakage

May 25, 2022

5 Ways to Effectively Prevent Data Leakage
Explore how you can stop data leakage with a solution that identifies and combats vulnerabilities inherent within your business. Learn more.
Tech Center
KillNet Utilizes CC-Attack: A Quick & Dirty DDoS Method

May 25, 2022

KillNet Utilizes CC-Attack: A Quick & Dirty DDoS Method
SecurityScorecard’s analysis of CC-Attack reveals the script automates the process of using open proxy servers to relay attacks.
Cyber Threat Intelligence
STRIKE Team
Understanding the Basics of Cyber Insurance: What You Need to Know

March 7, 2022

Understanding the Basics of Cyber Insurance: What You Need to Know
Learn more about the basics of cyber insurance and how it can — and can’t — help your organization recover from a cyber incident.
Cyber Insurance
Executive Viewpoint
Tech Center
What is Cyber Hygiene? Definition, Benefits, & Best Practices

March 2, 2022

What is Cyber Hygiene? Definition, Benefits, & Best Practices
Cyber hygiene is the collection of regular best practices that an organization undertakes to keep its network and data safe and secure. Learn all about it.
Tech Center
25 Common Types of Malware & How To Identify Them

February 16, 2022

25 Common Types of Malware & How To Identify Them
Explore the several types of malware and the traits that will help your organization identify each. Read more on SecurityScorecard’s blog.
Tech Center
6 Benefits of Effective Risk Management in Cybersecurity

February 7, 2022

6 Benefits of Effective Risk Management in Cybersecurity
Having an effective cybersecurity risk management program is much more than an option. Rather, it’s a crucial component of business continuity. Explore the top benefits now.
Tech Center
What is a Botnet Attack? 5 Ways to Prevent It

February 2, 2022

What is a Botnet Attack? 5 Ways to Prevent It
A botnet attack happens when a group of devices is infected by malware that is under the control of a hacker. Explore ways to prevent botnet attacks from happening now.
Tech Center
What is Third Party Due Diligence? What You Should Know

January 31, 2022

What is Third Party Due Diligence? What You Should Know
Due diligence is the investigation that a person or business is expected to take on before entering into an agreement with a third-party. Learn more.
Tech Center
How to Measure Risk Management Performance: KPI & Metrics

January 3, 2022

How to Measure Risk Management Performance: KPI & Metrics
Cybersecurity professionals are facing an unprecedented amount of scrutiny. Not only are they responsible for securing and protecting their organizations, but they also need to prove that their ideas and strategies for doing so have a meaningful impact. This can be hard when the threat landscape is constantly changing and… Read More
Security Ratings
Tech Center
First-Party vs Third-Party Cyber Insurance: What’s the Difference?

December 6, 2021

First-Party vs Third-Party Cyber Insurance: What’s the Difference?
First-party and third-party cyber insurance work to protect your business from serious financial and reputational damage that may result from a data breach. Learn more.
Cyber Insurance
Executive Viewpoint
Tech Center
Guide to Performing a Data Risk Assessment

November 24, 2021

Guide to Performing a Data Risk Assessment
Check out this guide to performing a data risk assessment that explains what it is, why it’s important, and how to engage in one. Read more
Tech Center