
SecurityScorecard Blog
Read the latest blog posts published weekly.
-
Blog
SIM Card Hacking: What It Is, How It Works, and How to Protect Yourself
April 11, 2025SIM cards might seem like harmless pieces of plastic, but they're often a gateway for serious cyber attacks. When hackers take over your mobile number, they can intercept private data, bypass security controls, and even drain your bank account.
More DetailsCyber Threat Intelligence, Enterprise Cyber Risk, Government, SCDR, Third-Party Risk Management -
Blog
CISOs: The Perfect SCORE With Your Board
April 11, 2025Boards don’t operate in threat models and tech stacks. They operate in risk, revenue, and accountability. And if you want their support, you need to meet them there. SecurityScorecard created the SCORE framework to help CISOs turn cybersecurity into a board-level conversation that gets results.
More DetailsExecutive Viewpoint -
Blog
Scorecarder Spotlight: Noor Al-Baker
April 9, 2025Our series “Scorecarder Spotlight” showcases our talented employees and the incredible work they do. Meet Noor Al-Baker!
More DetailsScorecarder Spotlight -
Blog
Automating Vendor Risk Management and Assessments
March 18, 2025Automated vendor risk assessments provide visibility into third-party vendors’ cybersecurity and enhance the third-party risk management process. Learn more.
More Details -
Blog
The Principles for Fair & Accurate Security Ratings: A Focus on Confidentiality
March 11, 2025Our Security ratings align with the Principles for Fair & Accurate Security Ratings, published by the US Chamber of Commerce. As part of this effort we strive to educate the cybersecurity community on how our products align with these important principles.
More Details -
Blog
Scorecarder Spotlight: Luciano Bargmann
March 5, 2025Our series “Scorecarder Spotlight” showcases our talented employees and the incredible work they do. Meet Luciano Bargmann!
More DetailsScorecarder Spotlight -
Blog
3 Tangible Benefits of an A Rating
March 4, 2025Security ratings are a standard in cybersecurity. Many organizations rely on them to manage their security programs and they create ROI for the organization. Despite the potential benefits, it can be challenging for organizations who are evaluating different security ratings options to determine the value they will get from them.
More Details -
Blog
From Reactive to Resilient: A New Mindset for Supply Chain Cybersecurity
March 4, 2025Key takeaways from a recent webinar featuring SecurityScorecard CISO, Steve Cobb, on how organizations can strengthen their cyber resilience in the face of evolving threats.
More DetailsSCDR -
Blog
Odyssey.conf 2025: Charting the Course for Cyber Resilience
March 4, 2025Last week, SecurityScorecard hosted our second annual Odyssey.conf in Miami, Florida. This year's conference focused on cyber resilience, providing attendees with actionable insights and cutting-edge strategies to navigate the ever-evolving threat landscape.
More DetailsSCDR -
Blog
Third-Party Risk Management Regulations: What You Should Know
February 18, 2025Third-party risk management regulations may seem like red tape nuisance at first, but these regulations ultimately reduce your organization’s risk as well. Learn more.
More Details -
Blog, Learning Center
Vendor Risk Assessment Template
February 13, 2025You can’t completely eliminate vendor risk, but you can manage it. Learn how to create a vendor risk assessment template with SecurityScorecard.
More DetailsTech Center -
Blog, Learning Center
The Ultimate Data Breach Response Plan
February 13, 2025In a hyper-connected world, data breaches continue to increase in size and scope. To bolster your cybersecurity posture, you should put together a data breach response plan as a way to prepare your organization.
More DetailsServices, Tech Center