SecurityScorecard Blog
Read the latest blog posts published weekly.
-
BlogThe Importance of Email Security
October 10, 2025Email security is the practice of safeguarding email accounts. Learn best practices to protect sensitive information and prevent breaches.
More DetailsSteve Cobb
-
BlogSIEM vs SOAR: The Key Differences for Modern Security Teams
October 10, 2025Learn the key differences between SIEM vs SOAR and how these security technologies work together to improve threat detection and response.
More DetailsSteve Cobb
-
BlogDark Web Monitoring Against Invisible Cyber Threats
October 10, 2025Keep your company's data safe from unseen threats. Our dark web monitoring uncovers stolen credentials and information before cybercriminals can use them. URL: /blog/dark-web-monitoring/
More DetailsSteve Cobb
-
BlogProtecting Patient Lives Through Cybersecurity in Healthcare
October 10, 2025Learn how cybersecurity in healthcare protects patient data from cyber attacks. Discover third-party risks, compliance strategies & security solutions.
More DetailsSteve Cobb
-
BlogWhat Is Digital Supply Chain Management
October 10, 2025What is digital supply chain management? Learn how digital transformation revolutionizes supply chains through technology and real-time insights.
More DetailsSteve Cobb
-
Blog, PressSecurityScorecard In The News Q3 2025
October 2, 2025Catch up on SecurityScorecard press coverage from Q3 2025, including TV and podcast interviews, coverage of a new STRIKE Threat Intelligence report on state-aligned cyber operations, North America, EMEA, and APAC media coverage, executive thought leadership, and company acquisition and partnership news.
More Details -
BlogSecurityScorecard CISO Steve Cobb on CBS: Secret Service Takes Down SIM Farm Threat Near UNGA
October 1, 2025SecurityScorecard’s CISO joins CBS News New York to Share Insights on the Secret Service Takedown.
More Details -
BlogSecurityScorecard Acquires HyperComply
September 15, 2025SecurityScorecard acquires HyperComply to reduce manual security questionnaire work by 92% and accelerate vendor onboarding 10x.
More DetailsSecurityScorecard
-
Blog, Learning CenterWhat is Cyber Threat Hunting?
September 12, 2025Master cyber threat hunting with expert techniques and tools to find hidden threats before they cause data breaches.
More DetailsSteve Cobb
Cyber Threat Intelligence, Tech Center -
Blog, Learning CenterWhat is SOC 2 Compliance? A Complete Guide for Security Leaders
September 12, 2025What is SOC 2 compliance? This guide explains the audit, the five trust services, and how to get a SOC 2 report for your service organization.
More DetailsSteve Cobb
Tech Center -
Blog, Learning CenterWhat is Data Exfiltration and How to Prevent It
September 12, 2025Discover what data exfiltration is, the methods attackers use, and the best solutions to prevent data loss, protect devices, and enhance data security.
More DetailsSteve Cobb
Tech Center -
Blog, Learning CenterWhat is HIPAA Compliance? A Complete Guide
September 12, 2025What is HIPAA compliance? Learn essential requirements, common violations, and best practices for healthcare data protection and security.
More DetailsSteve Cobb
Tech Center