Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

What Did the LastPass Breach Reveal About Password Manager Security?

July 8, 2025

What Did the LastPass Breach Reveal About Password Manager Security?
A Breach That Reshaped Password Manager Security The 2022-2023 breach of LastPass, a mainstay among password manager tools, served as a jarring wakeup call to anyone looking to secure passwords and ultimately keep private their sensitive personal information and confidential business information. This isn’t just about stolen… Read More
Are Open Ports Putting Your Network at Risk?

July 8, 2025

Are Open Ports Putting Your Network at Risk?
What Are Open Ports? Every internet-connected device uses ports to exchange data. These virtual endpoints allow services like remote access, file sharing, and web traffic to function. But ports can be a double-edged sword. When left misconfigured or exposed, open ports… Read More
HTTPS vs. HTTP: Why Secure Connections Matter in 2025

July 8, 2025

HTTPS vs. HTTP: Why Secure Connections Matter in 2025
HTTP vs. HTTPS: The Core Difference in 2025 Every time you visit a website, your browser initiates a conversation with a server using either HTTP or HTTPS. While both protocols retrieve and display content, one leaves your data open to interception. Read More
How Does PGP Encryption Work—and Is It Still Secure in 2025?

July 8, 2025

How Does PGP Encryption Work—and Is It Still Secure in 2025?
What Is PGP Encryption? One of the most enduring tools in the fight to protect sensitive data is Pretty Good Privacy (PGP), a foundational method for email encryption and file protection. It’s a protocol that has stood the test of time since it was first developed in… Read More
How Do You Write a Strong Information Security Policy in 2025?

July 7, 2025

How Do You Write a Strong Information Security Policy in 2025?
A strong information security policy in 2025 must go beyond compliance. Learn how to build a policy that supports the full end-to-end risk third-party risk management (TPRM) program. Information security policy 2025 frameworks are internal documentation and foundational risk management assets. As organizations continue to expand… Read More
What You Need To Know About DeepSeek Security Issues and Vulnerabilities

July 7, 2025

What You Need To Know About DeepSeek Security Issues and Vulnerabilities
What Is DeepSeek? DeepSeek, a Chinese artificial intelligence (AI) startup, has gained rapid adoption and popularity across enterprises for automation and research. But alongside its capabilities come real security and privacy challenges. From the potential for SQL injection scenarios to concerns… Read More
What Are the Best Tools and Techniques to Recover from Ransomware in 2025?

July 7, 2025

What Are the Best Tools and Techniques to Recover from Ransomware in 2025?
How do you recover from ransomware in 2025? Recovery is not just about restoring encrypted files. Ransomware actors frequently combine data theft, extortion, and third-party compromise to wreak havoc at targeted organizations. The result is a full-spectrum crisis that can span IT, legal, senior… Read More
How Does Role-Based Access Control (RBAC) Improve Organizational Security?

July 7, 2025

How Does Role-Based Access Control (RBAC) Improve Organizational Security?
What is RBAC? Role-Based Access Control (RBAC) is an access management model that limits user access based on predefined job roles. Rather than assigning permissions to each user individually, RBAC ties access permissions to roles, which are then assigned… Read More
What Is Doxing and How Can You Prevent It?

July 7, 2025

What Is Doxing and How Can You Prevent It?
Doxing—short for “dropping documents” or “dox”—refers to the malicious exposure of someone’s personal or personally identifiable information (PII) online without their consent. Though once a fringe tactic used in online feuds, doxing has evolved into a sophisticated OSINT threat targeting businesses, executives,… Read More
Kerberos vs. LDAP: Choosing the Right Enterprise Protocol

July 7, 2025

Kerberos vs. LDAP: Choosing the Right Enterprise Protocol
Modern enterprise authentication depends on protocols that validate identities while managing who can access what. Two critical components—Kerberos and LDAP directory services—can work in tandem to help network admins centralize and streamline workflows. They serve different purposes but frequently coexist, especially… Read More
What Are Must-Do Security Steps When Setting Up a New Server?

July 7, 2025

What Are Must-Do Security Steps When Setting Up a New Server?
Every server provisioned without hardening may as well be a ticking time bomb. If you don’t apply security controls from the beginning, you risk exposing the system to attack, even before attackers put in motion an attack plan. Misconfigured ports… Read More
Scorecarder Spotlight: Isabella Dorado Burbano

July 1, 2025

Scorecarder Spotlight: Isabella Dorado Burbano
Our “Scorecarder Learning & Development Spotlight” series showcases our talented, driven employees, the incredible work they do, and their quest to continue their development as lifelong learners.   Name: Isabella Dorado Burbano… Read More
Scorecarder Spotlight
What is a Cyber Attack? Types and Preventive Measures

June 30, 2025

What is a Cyber Attack? Types and Preventive Measures
Cyber attacks have progressed from mere technical annoyances to business-critical threats that require immediate attention. Recent examples include ransomware that has shut down healthcare systems and supply chain attacks that have exposed millions of records. As we become more dependent on technology, cyberattacks will… Read More
What is a Whaling Attack in Cybersecurity?

June 30, 2025

What is a Whaling Attack in Cybersecurity?
A whaling attack is a sophisticated form of phishing designed to target high-ranking individuals within an organization, typically executives like CEOs or CFOs. If you’re wondering what is whaling in cyber security, it refers to a specific type of phishing attack that mimics high-level communications to deceive… Read More
What is DNSSEC and Why Is It Important?

June 30, 2025

What is DNSSEC and Why Is It Important?
The Domain Name System (DNS) is a core function of the internet, but it was never built with security in mind. As cyber threats evolve, attackers increasingly exploit DNS attack risks. DNSSEC, or Domain Name System Security Extensions, addresses these risks by adding authentication to… Read More
10 Cybersecurity Criteria for Smarter Vendor Selection

June 25, 2025

10 Cybersecurity Criteria for Smarter Vendor Selection
Why Vendor Selection Must Start with Security Breaches no longer just originate inside an organization’s own infrastructure. Increasingly, they begin with vendors via weak access controls, exposed credentials, or vulnerable third-party software. According to SecurityScorecard’s 2025 Global Third-Party… Read More
How to Build an OPSEC Culture in Your Organization

June 25, 2025

How to Build an OPSEC Culture in Your Organization
What Is Operational Security (OPSEC) in Cybersecurity? Operational Security (OPSEC) is the discipline of protecting sensitive information by controlling what adversaries can observe, infer, or exploit from available information. It focuses not necessarily on firewalls or encryption, but on habits, human behavior,… Read More
What is the Difference Between IT Risk Management and Cybersecurity?

June 25, 2025

What is the Difference Between IT Risk Management and Cybersecurity?
IT Risk vs. Cybersecurity: Why the Distinction Matters IT risk management and cybersecurity are closely related—but they serve different purposes. Confusing the two can weaken your risk strategy, obscure threat visibility, and lead to gaps in leadership communication. Clarifying their roles… Read More
Building a Vendor Risk Management Program: Strategies for Success

June 25, 2025

Building a Vendor Risk Management Program: Strategies for Success
Why Vendor Risk Management Is Now a Business Imperative Your biggest cyber risk might not live inside your network—it might be lurking inside your vendor ecosystem. As organizations adopt more third-party services and platforms, they inherit risk they can’t directly control. According to SecurityScorecard’s… Read More
What Is FIPS 140-3 and Why Does It Matter for Security Compliance?

June 25, 2025

What Is FIPS 140-3 and Why Does It Matter for Security Compliance?
What Is FIPS 140-3? FIPS 140-3 is the current U.S. government standard for validating cryptographic modules used to protect sensitive information. Developed by the National Institute of Standards and Technology (NIST), it replaces FIPS 140-2 and aligns with international encryption standards, specifically ISO/IEC 19790:2012… Read More
What’s the Difference Between Ethical Hacking and Cybersecurity Operations?

June 25, 2025

What’s the Difference Between Ethical Hacking and Cybersecurity Operations?
Why Ethical Hacking vs. Cybersecurity Operations Matters Modern cyber defense runs with a dual track. On one side, ethical hackers simulate adversaries to reveal weaknesses. On the other, cybersecurity operations teams defend continuously against real threats. This red team vs blue team model helps organizations… Read More