
Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Webinar
Strengthening Vendor Relationships and Building Cyber Resilience
February 28, 2025More DetailsSCDR -
Press
SecurityScorecard and P3 Group Join Forces to Elevate Global Supply Chain Security
February 25, 2025SecurityScorecard, the leader in Supply Chain Detection and Response (SCDR) solutions, and P3 Group, a global consulting and technology company specializing in business transformation, cybersecurity and software development, today announced a strategic partnership.
More Details -
Research
Massive Botnet Targets M365 with Stealthy Password Spraying Attacks
February 24, 2025A Technical Breakdown of Large-Scale Password Spraying Through Non-Interactive Sign-Ins
More DetailsSTRIKE Team -
Learning Center
What is the Difference Between Information Security vs Cybersecurity?
February 13, 2025Information security and cybersecurity are often used interchangeably; however, they both address different kinds of security. Learn more.
More DetailsTech Center -
Learning Center
What is IT Risk Management? A Complete Guide
February 13, 2025More DetailsTech Center -
Blog, Learning Center
The Ultimate Data Breach Response Plan
February 13, 2025In a hyper-connected world, data breaches continue to increase in size and scope. To bolster your cybersecurity posture, you should put together a data breach response plan as a way to prepare your organization.
More DetailsServices, Tech Center -
Learning Center
What’s Wrong with Two-Factor Authentication?
February 13, 2025Though requiring an extra identifier does deter some hackers from attacking systems defended with two-factor authentication, it is not always your safest option. Find out more on SecurityScorecard's blog.
More DetailsTech Center -
Learning Center
How Can You Secure Risky Open Ports?
February 13, 2025Open network ports enable organizations to adopt cloud strategies. However, each port is technically a small gateway into an organization’s IT stack. Learn how you can security risky open ports.
More DetailsTech Center -
Learning Center
The Role of Cybersecurity in Enterprise Risk Management (ERM)
February 13, 2025An enterprise risk management program should include a cybersecurity element so organizations can identify relationships between risk and impact across its ecosystem.
More DetailsTech Center -
Blog, Learning Center
Vendor Risk Assessment Template
February 13, 2025You can’t completely eliminate vendor risk, but you can manage it. Learn how to create a vendor risk assessment template with SecurityScorecard.
More DetailsTech Center -
Research
Lazarus Group is Infecting Open-Source Code. Are You at Risk?
February 13, 2025North Korea’s Lazarus Group is hiding malware inside GitHub repositories and NPM packages, compromising developers and cryptocurrency platforms. Their targets: your code, your wallets, your users.
More DetailsSTRIKE Team