Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Learning Center
Securing the Vault: Cybersecurity in the Financial Sector
February 8, 2024In today's digital world, online financial transactions have significantly improved people's lives. They are easier and more secure compared to physical transactions. But with the increasing number of online transactions every day, the security aspect of these transactions cannot be overlooked. They should be highly secure so that people can trust that both their money and data is safe.
More DetailsTech Center -
Learning Center
Cloud Security Best Practices
February 8, 2024Explore essential cloud security best practices, including encryption, access control, and recovery planning, to safeguard digital assets.
More DetailsTech Center -
Learning Center
Cybersecurity For The Internet of Things (IoT)
February 8, 2024Let's discuss IoT device security, exploring challenges, real-world scenarios, and future trends to safeguard our connected world.
More DetailsTech Center -
Learning Center
How to Deal with Cyber Attacks Using the NIST Framework
The NIST Cybersecurity Framework was developed in collaboration with government agencies and the private sector, and is most commonly used by companies in the U.S.
More DetailsTech Center -
Learning Center
How Can I Create a Strong Password? Best Practices for Staying Safe Online
February 8, 2024Creating a strong password is of utmost importance to prevent attackers from gaining unauthorized access to online accounts, which could potentially result in reputational or financial loss.
More DetailsTech Center -
Blog
Scorecarder Spotlight: Priya Thupili
February 8, 2024Our series “Scorecarder Spotlight” showcases our talented employees and the incredible work they do. Meet Priya Thupili!
More Details -
Research
United Arab Emirates Cybersecurity: Supply Chain Threat Report
February 7, 2024This research presents an analysis of the cybersecurity landscape of the top 30 companies in the United Arab Emirates (UAE) by revenue. Companies were ranked based on various factors, such as: network security, potential malware infections, and patching cadence.
More DetailsSupply Chain Cyber Risk -
Blog
C-Suite Liability & Cybersecurity: Navigating a New Era of Enforcement
November 22, 2023It’s well established that corporate directors have fiduciary “duties of care” to protect their companies against major risks and compliance failures. Only recently have courts clarified that these duties now extend to the C-Suite -- CEOs, CISOs, GCs and other key executives now face personal liability for failing to safeguard their companies.
More DetailsOwen Denby, General Counsel, SecurityScorecard
Executive Viewpoint -
Blog
What Drives Cyber Risk? Cyber Insurers and SecurityScorecard Reveal Answers
October 19, 2022Seeking to stay ahead of hackers, many researchers have asked themselves what drives cyber risk. And many cyber insurance carriers have wondered how to accurately underwrite and price the risk. According to preliminary results from SecurityScorecard’s joint work with our cyber insurance partners, the answer is clear but multi-faceted.
More DetailsCyber Insurance -
Learning Center
DDoS Attacks: What You Need To Know
February 6, 2024Uncover essential insights into DDoS attacks, their types, and effective prevention strategies to safeguard your digital domain effectively.
More DetailsTech Center -
Blog
Applying the Churchill Knowledge Audit to Cybersecurity: The Importance of Security Ratings
December 19, 2023As a CISO, I am frequently pitched by companies promising to transform or revolutionize my job. I shrug off most pitches because they don’t add any value to what I’m doing. But every once in a while, an organization comes along that offers something new.
More DetailsAndrew Jaquith, Board Advisor
Executive Viewpoint -
Learning Center
Hacker Subcultures: Unmasking the Motivations and Methods
February 5, 2024Explore hacker subcultures and their impact on cybersecurity, from ethical white hats to disruptive script kiddies, in this insightful read.
More DetailsTech Center