
SecurityScorecard Blog
Read the latest blog posts published weekly.
-
Blog
Third-Party Risk Management Framework: How to Select the Right One
February 4, 2025Third parties come with significant cyber security risks. Learn how to select the right risk management framework.
More Details -
Blog
Beyond the Perimeter: Why CISOs Need Supply Chain Detection and Response
February 4, 2025Organizations rely heavily on external vendors and suppliers, creating complex supply chains vital for operations. However, this introduces a new dimension of risk: supply chain attacks. SCDR is a comprehensive security framework that focuses on identifying, assessing, and responding to threats within the supply chain.
More DetailsSCDR, Supply Chain Cyber Risk -
Blog
Operation Phantom Circuit: North Korea’s Global Data Exfiltration Campaign
January 29, 2025In December 2024, a routine software update concealed a global threat. Attackers from the Lazarus Group, based in North Korea, infiltrated trusted development tools, compromising hundreds of victims worldwide. This sophisticated campaign, code-named "Phantom Circuit," targeted cryptocurrency and technology developers, employing advanced obfuscation techniques through proxy servers in Hasan, Russia.
More DetailsSTRIKE Team -
Blog, Learning Center
Implementing Non-Repudiation in Your Security Strategy: Best Practices and Techniques
Explore best practices for implementing non-repudiation in security strategies to ensure transaction authenticity and protect against fraud.
More DetailsTech Center -
Blog
5 Reasons to Integrate Continuous Monitoring into Your TPRM Program
January 21, 2025Learn 5 reasons your organization should integrate continuous monitoring into their third-party risk management program. Read SecurityScorecard's blog
More Details -
Blog
What is the Threat Landscape?
January 17, 2025Discover the current threat landscape and learn how to identify, assess, and mitigate evolving cyber risks to protect your organization from potential attacks.
More Details -
Blog, Research
Operation 99: North Korea’s Cyber Assault on Software Developers
January 15, 2025On January 9, the SecurityScorecard STRIKE team uncovered Operation 99, a cyberattack by the Lazarus Group, North Korea’s state-sponsored hacking unit.
More DetailsRyan Sherstobitoff, SVP, Threat Research & Intelligence in Threat Intelligence
STRIKE Team -
Blog
How Security Ratings Help Build Strong Business Relationships
January 14, 2025See how security ratings allow you to strengthen business relationships by giving you the information you need to enable stronger business outcomes. Learn more about security ratings for business.
More Details -
Blog
Securing Patient Data: A Guide to Managed Services for Supply Chain Detection and Response in Healthcare
January 14, 2025Patient data is among the most sensitive and valuable information in the healthcare industry. A single breach can have devastating consequences. Learn how a managed service for SCDR can help.
More DetailsSCDR -
Blog
Securing Your Financial Ecosystem: A Guide to Managed Services for Supply Chain Detection and Response
January 10, 2025This blog explores the critical role of Managed Services for Supply Chain Detection and Response (SCDR) in securing your financial institution.
More DetailsSCDR -
Blog
Day in the Life of a CISO: A Vendor Breach: Assessing Our Exposure
December 19, 2024Day in the Life of a CISO: A Vendor Breach: Assessing Our Exposure
More Details -
Blog
Securing Your Healthcare Supply Chain: A Guide to Supply Chain Detection and Response
December 17, 2024In today's interconnected healthcare landscape, supply chain security has emerged as a critical concern. Cyber threats are becoming increasingly sophisticated, targeting vulnerable points in the supply chain to infiltrate networks and steal sensitive patient data. As a result, healthcare organizations must prioritize the security of their vendors and partners to protect their own operations and patient information.
More DetailsHealthcare, SCDR