Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

Top 7 Security Risks of Cloud Computing

June 21, 2021

Top 7 Security Risks of Cloud Computing
Many businesses are shifting workloads to the cloud in an effort to increase efficiency and streamline workloads. In fact, according to the Flexera 2021 State of the Cloud Report, roughly 90% of enterprises anticipate cloud usage will expand even further as a result of COVID-19. While cloud computing… Read More
Tech Center
JBS Ransomware Attack Started in March and Much Larger in Scope than Previously Identified

June 8, 2021

JBS Ransomware Attack Started in March and Much Larger in Scope than Previously Identified
SecurityScorecard found that the JBS ransomware attack started in March and is much larger in scope than previously identified. Check out SecurityScorecard’s research.
Cyber Threat Intelligence
STRIKE Team
KPIs for Security Operations & Incident Response

June 7, 2021

KPIs for Security Operations & Incident Response
Creating a resilient cybersecurity program means understanding your current security posture and knowing what you want your future cybersecurity posture to look like. In today’s constantly changing threat landscape, cybersecurity maturity is the best way to mitigate security incident risks. However, understanding maturity means knowing where… Read More
Tech Center
How to Identify and Prepare for Network Security Threats and Vulnerabilities

May 26, 2021

How to Identify and Prepare for Network Security Threats and Vulnerabilities
Network security threats are constantly evolving. Find out how to identify network threats and address vulnerabilities to protect your organization.
Tech Center
Top 11 IoT Cybersecurity Challenges Facing Businesses

May 17, 2021

Top 11 IoT Cybersecurity Challenges Facing Businesses
As companies increasingly adopt Internet of Things (IoT) devices to enable business operations, they need to consider the following IoT cybersecurity risks and find ways to adequately mitigate them. Learn more.
Tech Center
Integrating Cybersecurity into Business Continuity Planning

May 12, 2021

Integrating Cybersecurity into Business Continuity Planning
By integrating cybersecurity into business continuity planning (BCP), organizations can enable collaboration across teams. Explore tips for combining BCP and cybersecurity.
Tech Center
14 Types of Phishing Attacks and How to Identify Them

May 5, 2021

14 Types of Phishing Attacks and How to Identify Them
Learn more about 14 Types of Phishing Attacks and How to Identify Them
Tech Center
How to Perform an Information Security Gap Analysis

May 3, 2021

How to Perform an Information Security Gap Analysis
The cyber threat landscape is ever-evolving, and the security controls that worked for your organization yesterday may no longer be sufficient today. Cyberattacks happen every second, and a security breach can result in the loss of clients’ confidential information, potentially leading to financial penalties and a damaged reputation. Read More
Tech Center
10 Tips for Setting Cybersecurity Goals for Your Business

April 7, 2021

10 Tips for Setting Cybersecurity Goals for Your Business
You don’t need to be a cybersecurity expert, or aware of every single threat to defend your organization’s assets. All you need are a set of cybersecurity goals unique to your organization and your industry. Check out these 10 tips for setting cybersecurity goals.
Tech Center
What is an Information Security Policy and What Should it Include?

April 6, 2021

What is an Information Security Policy and What Should it Include?
An Information Security Policy establishes a set of rules and processes that govern how your workforce handles the organization’s information technology. This includes networks, applications, and data storage systems that protect the confidentiality, integrity, and availability of your information assets. Nowadays, having… Read More
Tech Center
SecurityScorecard’s Board Trends Report Provides Actionable Insight

March 31, 2021

SecurityScorecard’s Board Trends Report Provides Actionable Insight
An effective cybersecurity report needs to be quantifiable and should frame the risks as they pertain to the business’s goals, strategies, and risk tolerance.
Security Ratings
Supply Chain Cyber Risk
10 Ways to Improve Your IP Reputation

March 29, 2021

10 Ways to Improve Your IP Reputation
Explore ten ways to improve your IP reputation that can help you identify and remediate problems, giving your email a better chance of going to your recipients’ inboxes. Read more.
Tech Center
The Ultimate Data Breach Response Plan

March 24, 2021

The Ultimate Data Breach Response Plan
In a hyper-connected world, data breaches continue to increase in size and scope. To bolster your cybersecurity posture, you should put together a data breach response plan as a way to prepare your organization.
Services
Tech Center
Top 25 Cybersecurity Frameworks to Consider

March 23, 2021

Top 25 Cybersecurity Frameworks to Consider
In a world where digital transformation increases compliance burdens, understanding how to best secure on-premises, cloud, and hybrid IT stacks becomes more crucial than ever. Most organizations, regulations apply penalties but rarely offer concrete strategies for securing systems, networks, software, and devices. While cybersecurity frameworks provide… Read More
Tech Center
What is Cyber Risk? Definition & Examples

March 17, 2021

What is Cyber Risk? Definition & Examples
Businesses have always faced different kinds of risk, but in the last two decades, cyber risk has become one of the fastest-growing threats to businesses, their data, and their financial success today. Learn more.
Tech Center
How to Resolve Findings on Your SecurityScorecard Rating

March 16, 2021

How to Resolve Findings on Your SecurityScorecard Rating
Understanding how to remediate and resolve SecurityScorecard security ratings findings can help you iterate your cybersecurity and compliance program for continued visibility into your risk posture. Find out more.
Security Ratings
34 Resources for Employee Cybersecurity Training

March 8, 2021

34 Resources for Employee Cybersecurity Training
Cybersecurity is a team effort. Check out these 34 resources for employee cybersecurity training.
Tech Center
41 Common Web Application Vulnerabilities Explained

March 5, 2021

41 Common Web Application Vulnerabilities Explained
Organizations continue to “shift left,” embracing the new employee and customer experiences delivered by cloud-based applications. Simultaneously, malicious actors continue to revise their attack methodologies to address this shift. To maintain data security and privacy, organizations need to protect against these 41 common web application vulnerabilities. 1. Broken… Read More
Tech Center
What Is a Cybersecurity Vulnerability and How Do They Lead to Breaches?

February 25, 2021

What Is a Cybersecurity Vulnerability and How Do They Lead to Breaches?
Cybersecurity vulnerabilities can lead to serious breaches. Learn what they are, how they’re exploited, and how to reduce your exposure.
Tech Center
10 Ransomware Examples from Recent High-Impact Attacks

February 24, 2021

10 Ransomware Examples from Recent High-Impact Attacks
Learn from 10 major ransomware examples that disrupted organizations worldwide. Understand attack methods and strengthen your cyber defenses.
Cyber Threat Intelligence
Tech Center
What Are the Best Data Leak Prevention Strategies for 2025?

February 22, 2021

What Are the Best Data Leak Prevention Strategies for 2025?
Discover the most effective data leak prevention (DLP) tactics—covering insider threats, cloud DLP, shadow IT, and vendor exposure.
Tech Center