SecurityScorecard Blog
Read the latest blog posts published weekly.
-
Blog
The Job Offer That Wasn’t: How We Stopped an Espionage Plot
October 29, 2024Discover how SecurityScorecard thwarted a sophisticated cyber-espionage plot disguised as a job offer. Learn about the 'Contagious Interview' campaign, the tactics used by the Famous Chollima group, and essential strategies to protect your organization from targeted attacks. Don't let your next career move become a trap—stay informed and secure!
More DetailsSteve Cobb, CISO, SecurityScorecard
STRIKE Team -
Blog
Inside a North Korean Phishing Operation Targeting DevOps Employees
October 29, 2024Uncover how SecurityScorecard thwarted a sophisticated phishing attack targeting our DevOps team. This blog details a North Korean state actor's attempt to deploy a malicious backdoor through a fake job offer on social media. Learn about the evolving tactics of threat actors and how our swift response blocked potential damage. Stay informed and strengthen your defenses against these persistent cyber threats.
More DetailsRyan Sherstobitoff, SVP Threat Research & Intelligence
Nation State Actors, Phishing, STRIKE Team -
Blog, Learning Center
Healthcare IT Security and Compliance in 2024 and Beyond: A Comprehensive Guide
October 17, 2024The healthcare industry remains a prime target for cyberattacks. As the industry navigates the digital landscape, ensuring cybersecurity compliance is paramount to protecting patient privacy and maintaining operational integrity.
More DetailsHealthcare, Services, Tech Center -
Blog, Learning Center
Complete Third-Party Risk Management (TPRM) Guide for 2025
October 16, 2024Learn effective third-party risk management strategies for 2025 to protect your business from cyber threats, ensure compliance, and secure vendor networks.
More DetailsThird-Party Risk Management -
Blog
Scorecarder Spotlight: Segev Eliezer & David Mound
October 11, 2024Our series “Scorecarder Spotlight” showcases our talented employees and the incredible work they do. Meet Segev Eliezer & David Mound!
More Details -
Blog
What is Supply Chain Detection and Response?
October 7, 2024Supply chain detection and response (SCDR) is a solution for supply chain incident responders that drives critical issue identification, vendor responsiveness, and time to incident resolution. SCDR solutions provide risk intelligence, AI-driven workflows, and collaboration capabilities to improve the security posture of your organization and your suppliers.
More DetailsGian Calvesbert
SCDR -
Blog
How the U.S. Department of Justice Can Improve Its Approach to Combat Ransomware Attacks
September 30, 2024How nations can work with industry to identify meaningful metrics, standards, and KPIs to help governments improve their cybersecurity posture and build deeper supply chain resilience.
More DetailsJeff Le
Public Sector, Supply Chain Cyber Risk -
Blog
The Road Taken: Pathways to Better Compliance
September 30, 2024Consider SecurityScorecard’s market-leading security solutions to secure your supply chain and help you in your compliance journey.
More DetailsOwen Denby, General Counsel
-
Blog
Women in Cyber 2024: Key Themes from AT&T’s Inaugural Conference
September 26, 2024More DetailsPriya Thupili
-
Blog
Scorecarder Spotlight: Anna Livingston
September 11, 2024Our series “Scorecarder Spotlight” showcases our talented employees and the incredible work they do. Meet Anna Livingston!
More Details -
Blog
Billington 2024: Key Cybersecurity Takeaways from the AI Age
September 9, 2024SecurityScorecard had the pleasure of participating in the 15th Annual Billington CyberSecurity Conference - a key convening of policymakers and industry thought leaders in our Nation’s Capital.
More DetailsAdam Eisenman and Jeff Le
Public Sector, Supply Chain Cyber Risk -
Blog
CISA’s Secure By Design: A Year Later
September 6, 2024In April this year, the CISA Secure By Design initiative turned one. The initiative calls for the public and private sectors to work together to challenge and encourage software manufacturing companies to adopt principles to ensure their software is developed and produced as securely as possible.
More DetailsSteve Cobb
Supply Chain Cyber Risk