Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Data Sheet
Simplify and Automate DORA TPRM Requirements with SecurityScorecard
January 30, 2025This extended data sheet guides you through DORA's TPRM requirements and how you can use SecurityScorecard to comply. Learn more.
More Details -
Data Sheet
Simplify and Automate NIS2 TPRM Requirements with SecurityScorecard
January 30, 2025This extended data sheet guides you through NIS2's TPRM requirements and how you can use SecurityScorecard to comply. Learn more.
More Details -
Blog
Operation Phantom Circuit: North Korea’s Global Data Exfiltration Campaign
January 29, 2025In December 2024, a routine software update concealed a global threat. Attackers from the Lazarus Group, based in North Korea, infiltrated trusted development tools, compromising hundreds of victims worldwide. This sophisticated campaign, code-named "Phantom Circuit," targeted cryptocurrency and technology developers, employing advanced obfuscation techniques through proxy servers in Hasan, Russia.
More DetailsSTRIKE Team -
Research
Operation Phantom Circuit: North Korea’s Global Data Exfiltration Campaign
January 29, 2025During STRIKE’s investigation of Operation 99, our team identified multiple command-and-control (C2) servers active since September 2024.
More DetailsSTRIKE Team -
Webinar
Building a High-Performing Supply Chain Incident Response Team
January 28, 2025Supply chain security is no longer an afterthought. With increasing threats and the potential for devastating consequences, organizations must proactively address supply chain risks. In this webinar, we will discuss how a well-structured supply chain incident response team can address these challenges and mitigate risks.
More DetailsSCDR -
Learning Center
The Top 7 Cyberattacks on U.S. Government: A closer look at the evolving landscape of cybersecurity
January 24, 2025Cyberattacks are an increasingly significant threat to governments worldwide. This blog post examines some of the top cyberattacks on US government.
More DetailsPublic Sector, Tech Center -
Learning Center
7 Incident Response Metrics and How to Use Them
January 24, 2025A robust incident response plan provides quantitative data. Check out these seven incident response metrics and how to use them.
More DetailsJeff Aldorisio
Tech Center -
Blog, Learning Center
Implementing Non-Repudiation in Your Security Strategy: Best Practices and Techniques
Explore best practices for implementing non-repudiation in security strategies to ensure transaction authenticity and protect against fraud.
More DetailsTech Center -
Press
SecurityScorecard Report: 58% of Breaches Impacting Leading U.S. Federal Contractors Caused by Third-Party Attack Vectors
January 22, 2025Report highlights the urgent need for federal contractors to address third-party risks as cybersecurity gaps threaten national security
More Details -
Research
Security Assessment of the Top 100 U.S. Gov’t Contractors
January 21, 2025Federal contractors are critical to the U.S. Government’s (USG) supply chain, yet their cybersecurity postures reveal significant weaknesses. This report evaluates the SecurityScorecard ratings and publicly available breach histories of the top 100 federal contractors for FY2023, highlighting problems and patterns that pose substantial third-party cyber risks to the USG. A breach at one of these contractors could expose USG data, compromise infrastructure, or disrupt essential products
More Details -
Blog
What is the Threat Landscape?
January 17, 2025Discover the current threat landscape and learn how to identify, assess, and mitigate evolving cyber risks to protect your organization from potential attacks.
More Details -
Learning Center
6 Cybersecurity Metrics Every CISO Should Monitor
January 16, 2025By tracking the right metrics, Chief Information Security Officers (CISOs) can monitor the effectiveness of their processes and controls overtime, evaluate team performance, and show return on investment (ROI) of security spending at the board level. Here is a list of metrics that can help CISOs prioritize and maximize their efforts, and conduct more effective security reporting at the board level, so they can drive value and growth within their organizations.
More DetailsSecurity Ratings, Tech Center