Resources
Cybersecurity white papers, data sheets, webinars, videos and more
Resource Library
August 2, 2022
Was the Explosion at Freeport LNG a Result of a Russian Cyber Attack?
Executive Summary On June 8, an explosion–which some commentators hypothesized was the result of a Russian cyber attack–took place at Freeport LNG’s liquefied natural gas (LNG) export facility in Quintana, Texas. SecurityScorecard’s platform revealed a number of vulnerabilities an attacker could have exploited. SecurityScorecard researchers observed some traffic involving Freeport… Read More
STRIKE Team
July 22, 2022
New: SecurityScorecard Extension for Chrome
Note: On August 27th, 2025, we removed the SecurityScorecard Chrome Extension from the Chrome Web Store as part of our continuous effort to streamline our platform and offer the best experience. This extension no longer fits with our platform access model. You can access the same functionality within the… Read More
Security Ratings
July 20, 2022
5 Steps to Selecting a Vendor Risk Management Framework
Third parties are an inevitable and essential part of your business ecosystem. They’re your vendors, partners, and contractors. They improve efficiency, extend your reach, and make it possible to deliver the best possible products and services. From a security perspective, however, they also bring a significant amount of risk. Read More
Tech Center
June 24, 2022
Top 5 Incident Response Best Practices You Should Follow
When it comes to cybersecurity, organizations need to be well-prepared for what comes next. Cybercriminals are constantly adapting to their targets, retooling and updating their tactics, techniques, and procedures (TTPs) to break in despite built-up defenses. And costs are rising. The… Read More
Tech Center
June 24, 2022
What is Digital Forensics? Everything You Need to Know: How It Supports Cybersecurity, Incident Response, and Compliance
Digital forensics refers to the recovery and investigation of material found in digital devices that may be evidence of crimes. As society becomes more and more reliant on computer systems, digital forensics has become a critical facet for law enforcement agencies and… Read More
Tech Center
June 22, 2022
What is Vendor Tiering? Tips to Improve Your Vendor Risk Management
Over the last few years, supply chain attacks have increased in number and sophistication. As companies accelerate their digital transformation strategies, managing third and fourth-party risk and a complete look into their security posture becomes more important to securing data and meeting mission-critical compliance requirements. According to one survey, … Read More
Tech Center
May 25, 2022
KillNet Utilizes CC-Attack: A Quick & Dirty DDoS Method
Executive Summary SecurityScorecard Threat Research & Intelligence analysis of a publicly available attack script known as CC-Attack, leveraged in the recent DDoS campaigns by KillNet, reveals the script automates the process of using open proxy servers to relay attacks. These proxy servers help to preserve the anonymity of… Read More
Cyber Threat Intelligence
STRIKE Team
March 7, 2022
Understanding the Basics of Cyber Insurance: What You Need to Know
Data breaches and cybercrime are all too common. And in recent years, ransomware attacks have caused many organizations to face hefty extortion payments, legal fees, and reputational damage – not to mention the major headache that comes with each. Cyber insurance has become a powerful tool in the world of… Read More
Cyber Insurance
Executive Viewpoint
Tech Center
March 2, 2022
What is Cyber Hygiene? Definition, Benefits, & Best Practices
You’ve likely been practicing good personal hygiene since childhood, but have you heard of cyber hygiene? Similar to personal hygiene practices, which maintain good health and well-being, cyber hygiene practices maintain the health and well-being of your sensitive data and connected devices. This blog will define… Read More
Tech Center
February 7, 2022
6 Benefits of Effective Risk Management in Cybersecurity
Cyber attacks are major threats to organizations and industries across the board. And as technology advances, cybersecurity continues to be the focus that requires serious attention. However, many have weaknesses and gaps in their cybersecurity strategy. Common weaknesses can include the failure to identify and mitigate risks, as well… Read More
Tech Center
December 6, 2021
First-Party vs Third-Party Cyber Insurance: What’s the Difference?
Often it’s not a question of if your business will experience a data breach, but when. Hackers are always looking for new ways to take advantage of weak networks or trick employees into falling prey to their schemes. And if your business operates computer systems or handles sensitive data regularly,… Read More
Cyber Insurance
Executive Viewpoint
Tech Center
November 24, 2021
Guide to Performing a Data Risk Assessment
Most companies know how to engage in a security risk assessment. However, the first step in the security assessment process should be engaging in a data risk assessment. While the two sound similar, they provide different insights. This guide to performing a data risk assessment explains what… Read More
Tech Center
November 11, 2021
What are Information Security Controls?
The possibility of a data breach at your organization can be anxiety-inducing. According to the Ponemon Institute, the average cost of a data breach is $3.61 million, and it’s on the rise; the average data breach cost is up 10% over last year and remote work is… Read More
Tech Center
October 6, 2021
Assessing Cyber Risk: 13 Critical Questions for the Board
Boards of Directors constantly need to be educated about and aware of their organizations’ cybersecurity posture. Regulations hold them responsible for decision-making and governance. Meanwhile, increased ransomware attacks pose a financial risk to their shareholders. To enhance the risk analysis, questions like these can provide visibility into… Read More
Tech Center
October 4, 2021
What are Threat Intelligence Feeds?
These feeds include actionable threat intelligence derived from various sources, such as commercial feeds, public sources, and honeypot networks. Threat intelligence feeds enable organizations to stay informed about potential threats by providing real-time insights into malicious activity. This information helps organizations strengthen their cybersecurity defenses by understanding attack… Read More
Cyber Threat Intelligence
Tech Center
September 27, 2021
A Guide to Cloud Data Security Best Practices
Cloud computing has revolutionized the business and technological landscape of the last decade. More organizations are turning to cloud services to better manage massive volumes of both structured and unstructured data on a daily basis. As organizations move more and more information and applications to the cloud,… Read More
Tech Center
September 9, 2021
Best Practices for Trusted Third-Party Risk Management
Third parties are a necessary part of your enterprise. They are your vendors, suppliers, contractors, and partners. Without them, you can’t do business. Third parties provide cloud services, store sensitive data, and provide other important services. Unfortunately,… Read More
Supply Chain Cyber Risk
Tech Center
September 8, 2021
What are the Types of Risk Assessments and When to Use Them?
Creating a cyber-resilient organization means understanding your security risks and how to mitigate them. However, the cybersecurity risk’s continuously shifting nature makes it challenging for organizations to choose the right risk assessment strategy. By understanding the types of risk assessments and how to use them, you… Read More
Tech Center
July 14, 2021
What is Zero Trust Architecture? 9 Steps to Implementation
As more companies migrate to the cloud, the way that they protect data changes as well. In a traditional on-premises network architecture, companies could follow the “trust but verify” philosophy. However, protecting cloud data needs to take the “never trust, always verify” approach. Understanding what a zero trust… Read More
Attack Surface Management
Tech Center
May 12, 2021
Integrating Cybersecurity into Business Continuity Planning
Organizations can no longer afford to wait until a threat is identified to start worrying about their cybersecurity risk management program. A cyber attack can cause a major business disruption across departments and severely impact day-to-day operations, both in the short and long term. For this reason, as organizations build… Read More
Tech Center
March 24, 2021
The Ultimate Data Breach Response Plan
In a hyper-connected world, security breaches continue to increase in size and scope. Cybersecurity threats come in various forms, from social engineering to database vulnerability exploitation. With that in mind, potential damages caused by these data breaches… Read More
Services
Tech Center