Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Webinar
The Future of Supply Chain Cybersecurity: Navigating the Evolving Landscape
March 5, 2024More DetailsExecutive Viewpoint, Supply Chain Cyber Risk -
Research, White Paper
A technical analysis of the APT28’s backdoor called OCEANMAP
March 5, 2024Late last year, the Computer Emergency Response Team of Ukraine (CERT-UA) released an advisory that reported cyberattacks targeting state organizations attributed to the Russian espionage group APT28, aka Fancy Bear/Sofacy. The advisory listed the use of a new backdoor named “OCEANMAP.” Download this whitepaper to explore a technical analysis of APT28’s tactics, techniques, and procedures.
More DetailsVlad Pasca
Cyber Threat Intelligence, Enterprise Cyber Risk, Supply Chain Cyber Risk -
Learning Center
Remediation vs Mitigation in Cybersecurity: Understanding the distinctions and strategic applications
March 5, 2024While remediation and mitigation might seem similar, understanding their distinctions and strategic applications is paramount for building robust defense mechanisms against cyber threats.
More DetailsTech Center -
Learning Center
Leveraging SIEM Splunk for Enhanced Cybersecurity: A Comprehensive Guide
March 4, 2024In this comprehensive guide, we'll delve into the world of SIEM Splunk and explore how organizations can leverage it to enhance their cybersecurity posture.
More DetailsTech Center -
Learning Center
Analyzing FERPA Violation Examples to Strengthen Data Privacy in Education
March 4, 2024The Family Educational Rights and Privacy Act (FERPA) is a crucial piece of legislation designed to safeguard students' educational records. Despite its importance, FERPA violations still occur, highlighting the need for continuous vigilance and proactive measures to strengthen data privacy in education.
More DetailsTech Center -
Blog, Learning Center
Proactive Strategies to Prevent Ransomware Attacks
March 4, 2024Essential strategies to protect your organization from ransomware attacks, including defense mechanisms, regular updates, & employee training.
More DetailsAttack Surface Management, Tech Center -
Blog
SecurityScorecard 2024 Global Third-Party Cybersecurity Breach Report: Software supply chain is top target for ransomware groups
February 28, 2024The SecurityScorecard Global Third-Party Breach Report uses the world's largest proprietary risk and threat dataset to provide unique insights into the intricate web of supply chain vulnerabilities exploited by ransomware groups.
More DetailsPaul Prudhomme, STRIKE Threat Intelligence Analyst
Cyber Threat Intelligence, Supply Chain Cyber Risk -
Press
SecurityScorecard Third-Party Breach Report Reveals Software Supply Chain as Top Target for Ransomware Groups
February 28, 2024SecurityScorecard today released its Global Third-Party Cybersecurity Breach Report. Using the world’s largest proprietary risk and threat data set, SecurityScorecard STRIKE threat hunters analyzed threat groups' mass exploitation of supply chain vulnerabilities.
More Details -
Research
Global Third-Party Cybersecurity Breach Report
February 28, 2024In-depth analysis of the most significant third-party cyber risks and incidents in 2023
More DetailsServices, Supply Chain Cyber Risk -
Video
SecurityScorecard for Cyber Underwriting Demo Video
September 26, 2022Underwriting applications just don't have all the data needed to understand a company's cyber security risk. SecurityScorecard has the most actionable data to help underwriters make the most profitable risk selection decisions without having to be cyber security experts. Let me show you how it works.
More Details -
Blog, Learning Center
Implementing Non-Repudiation in Your Security Strategy: Best Practices and Techniques
Explore best practices for implementing non-repudiation in security strategies to ensure transaction authenticity and protect against fraud.
More DetailsTech Center -
Blog, Learning Center
Securing Port 139: Strategies to Prevent Unauthorized Access and Cyber Threats
November 7, 2024Discover how to secure Port 139 against cyber threats with SMB protocol security, preventing unauthorized access and ensuring network safety.
More DetailsTech Center