Resources
Cybersecurity white papers, data sheets, webinars, videos and more
Resource Library
April 21, 2026
Rethinking the Questionnaire: Why Better Tech and More People Won’t Clear Your TPRM Backlog
Assessment backlogs are a common challenge for Third-Party Risk Management (TPRM) programs. Most organizations tackle the problem by increasing their capacity through hiring or improving efficiency with technology. While both are important elements of the solution, organizations also need to implement the right process for prioritizing the necessary business outcomes. Read More
MAX
April 9, 2026
Introducing SecurityScorecard AI Agents
Transform your vendor risk management with new SecurityScorecard AI Agents. Learn how to automate security questionnaire management, gain real-time threat insights, and accelerate remediation to stay ahead of emerging cyber threats.
April 1, 2026
RSAC 2026 Recap: What Did RSAC 2026 Reveal About the Future of TPRM? SecurityScorecard’s TITAN AI Sets the Pace
CEO and Co-Founder Dr. Aleksandr Yampolskiy, CISO Steve Cobb, and SecurityScorecard leaders joined chief information security officers (CISOs), partners, and industry experts at RSAC 2026 to discuss how AI, threat intelligence, and continuous monitoring are reshaping third-party risk management (TPRM). RSAC 2026 reinforced a growing gap between how organizations manage… Read More
March 31, 2026
AI Is Reshaping Cyber Risk in 2026: Why Boards Must Take Ownership Now
Cybersecurity leaders must accept a hard truth: AI has already broken the traditional model of defense in 2026. Attackers now operate faster, at lower cost, and at greater scale than most organizations can handle. The only viable response is to rethink security as a continuous, business-driven risk function. This shift… Read More
March 31, 2026
Iran Conflict and the Expanding Cyber Front: What Government Leaders Need to Know
When conflict escalates in the Middle East, the battlefield is never limited to geography. It extends into energy grids, government networks, transportation systems, and financial infrastructure. The current war involving Iran is no exception. While missiles and airstrikes dominate headlines, the parallel cyber dimension may prove equally consequential, particularly for… Read More
March 31, 2026
SecurityScorecard Appoints Dean Sysman to Board of Directors
SecurityScorecard today announced that Dean Sysman, Co-Founder and Executive Chairman of Axonius, has joined its Board of Directors as an independent director. Dean is one of the most respected builders in cybersecurity today. Sysman co-founded Axonius and scaled it into a leader in cyber asset management. The platform helps organizations… Read More
March 26, 2026
RSAC 2026 Talk: Transforming Third-Party Risk Management From Compliance Checkboxes to Security Resilience
The traditional approach to managing supply chain risk is broken. For years, organizations have relied on annual questionnaires and static attestations to “check the box” for compliance. However, as SecurityScorecard CISO Steve Cobb highlighted in his RSAC 2026 talk, “The Outside-In Advantage: Modernizing TPRM with AI and Threat Intelligence,” 90%… Read More
March 24, 2026
SecurityScorecard and Dataminr Partner to Deliver Preemptive Cyber Defense for the Enterprise
Combining third party risk and external attack surface management with client-tailored threat intelligence to help organizations stop threats before they strike.
February 25, 2026
What the Mississippi Ransomware Attack Means for Healthcare and How to Protect Critical Infrastructure
A ransomware attack shut down clinics across Mississippi. Learn how healthcare and critical infrastructure can prevent supply chain-driven cyber disruptions.
February 17, 2026
What Are the Real Security Risks of Agentic AI and OpenClaw?
SecurityScorecard’s STRIKE Threat Intelligence team examines exposed OpenClaw deployments and the broader security risks of agentic AI, including remote code execution vulnerabilities, prompt injection, and the security controls organizations must implement now.
February 14, 2026
What is a CVE and Why is It Important?
What is a CVE? This guide explains how security teams use Common Vulnerabilities and Exposures to identify, track, and prioritize the threats that matter most.
February 11, 2026
How Exposed OpenClaw Deployments Turn Agentic AI Into an Attack Surface
SecurityScorecard’s STRIKE Threat Intelligence team details new research on exposed OpenClaw agentic AI deployments, explaining how attackers can abuse them for remote code execution and infrastructure misuse. STRIKE also shared steps organizations can take to reduce exposure.
February 10, 2026
Recent Data Breach Examples
Discover how real data breach examples expose third-party risks. Learn from MOVEit, healthcare breaches, and M365 attacks to protect your business.
February 9, 2026
Strengthening National Cyber Resilience: Reflections from My Fireside Chat with ONCD Director Sean Cairncross
Mike Centrella, SecurityScorecard Head of Public Policy, shares insights from his fireside chat with the National Cyber Director Sean Cairncross on strengthening U.S. cyber resilience, deterrence, AI security, and workforce strategy.
February 9, 2026
Beyond the Hype: Moltbot’s Real Risk Is Exposed Infrastructure, Not AI Superintelligence
While the world debates Moltbook’s role in the AI ecosystem, it is just the tip of the iceberg of Titanic risk. SecurityScorecard’s STRIKE team uncovered what lurks beneath: Thousands of exposed OpenClaw (Moltbot) control panels vulnerable to takeover through misconfigured access and known exploits.
STRIKE Team
February 5, 2026
Why India Is Emerging as a Third-Party Breach Hotspot
SecurityScorecard experts analyzed why 52.6% of Indian vendors experienced at least one third-party breach in the past year in a recent webinar. India has become one of the most critical engines of the global digital economy and one of the most targeted.
February 4, 2026
What is a SOC 2 Compliance Checklist?
Use this SOC 2 compliance checklist to prepare for your audit, meet requirements, and maintain continuous compliance. Expert guidance for security leaders.
February 3, 2026
What Are Moltbot and Moltbook and What Happens When Agentic AI Assistants Scale Without Security
Moltbot AI assistants and their social media platform Moltbook have sparked AGI fears in recent days, but the real risk is access. Learn what Moltbook and Moltbot are (now OpenClaw and formerly known as Clawdbot), why it’s not artificial general intelligence (AGI), and how to reduce security exposure.
February 3, 2026
What Is Network Cloud Security?
Learn what network cloud security is, why traditional approaches fall short, and best practices for protecting your cloud infrastructure from security threats.
February 3, 2026
Odyssey 2026 Recap: Building Continuous Supply Chain Resilience in an Era of Persistent Threats
SecurityScorecard’s Odyssey 2026 customer conference in Miami brought CISOs together to examine continuous, threat-informed supply chain security and the shift from periodic assessments to real-time risk operations.
February 2, 2026
What Is Cyber Incident Response and Why It Matters
Learn what cyber incident response is, the steps in the incident response lifecycle, and how to build effective incident response teams and playbooks.