
Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Learning Center
EDR vs XDR: Choosing the Right Cybersecurity Solution for Your Organization
XDR or EDR? Learn which solution is best for your organization to effectively combat evolving cyber threats.
More DetailsTech Center -
Learning Center
Evolving Threat Detection: The Strategic Advantages of XDR over Traditional EDR Solutions
Discover how XDR solutions offer strategic advantages over traditional EDR for enhanced cybersecurity and threat detection.
More DetailsTech Center -
Blog
Breaches Beyond Borders: The global landscape of third-party risk
March 27, 2024Read some of the highlights from SecurityScorecard's recent webinar, which examined our Global Third-Party Cyber Breach report.
More DetailsThird-Party Risk Management -
Research
The Cybersecurity of France’s Top 100 Companies
March 26, 2024Cette étude présente une analyse du paysage de la cybersécurité des 100 plus grandes entreprises françaises (en termes de capitalisation boursière).
More DetailsSecurity Ratings, Supply Chain Cyber Risk -
Press
All of France’s Top 100 Companies Exposed to Supply Chain Breaches
March 26, 2024SecurityScorecard uncovered that 98% of these French companies have a third-party vendor that reported a breach.
More Details -
Blog
How to Avoid Online Tax Day Scams: Tips to protect your finances and data
March 25, 2024As Tax Day in the U.S. looms on the horizon, so too does the risk of falling victim to online scams. In 1986, the first year that e-filing was available, five people filed their returns electronically. Since then, the popularity of e-filing has increased so much that 92% of individual tax returns are now e-filed. As online tax filing and payment have become more popular, though, scams targeting unsuspecting taxpayers have as well.
More DetailsRob Ames, Senior Staff Threat Researcher
Tech Center -
Blog, Learning Center
Securing Samba Ports: Essential Practices for Safeguarding Your Network
Learn how to secure Samba ports and protect your network from unauthorized access and cyber threats with our essential security practices.
More DetailsTech Center -
Blog, Learning Center
Proactive Measures to Prevent Data Theft
Explore effective strategies to prevent data theft and safeguard your organization's reputation and financial stability.
More DetailsTech Center -
Blog, Learning Center
What Is Port 445 (SMB)? Strategies for Secure Network Communication
November 7, 2024Port 445 enables SMB traffic but is a prime target for ransomware and wormable exploits. Learn what it is, why it’s risky, and how to secure it.
More DetailsTech Center -
Blog, Learning Center
How Brand Protection Software Shields Your Reputation
Safeguard your brand's online reputation with powerful protection software, defending against cyber threats and maintaining trust.
More DetailsTech Center -
Blog
What is Supply Chain Detection and Response (SCDR)?
March 21, 2025Supply Chain Detection and Response (SCDR) is a new cybersecurity framework that identifies, prioritizes, and remediates vulnerabilities across an organization's vendor ecosystem. Its purpose is preventing supply chain attacks from threat actors and mitigating concentration risk when critical providers experience outages or security failures.
More DetailsGian Calvesbert
SCDR -
Blog
Why metrics—and context—matter: How CISOs can measure and communicate cyber resilience
March 21, 2024Cyberattacks in the digital supply chain are now some of the most common cyber incidents today, with many of the recent major breaches resulting from a single vulnerability. Because of the rapid pace and scale of these attacks, cyber leaders can no longer rely on static analyses of their environments, and must continuously assess cyber risk across their entire supply chain and vendor ecosystem. They must also produce quantitative metrics to measure their organizations’ dynamic risk in a standardized, easy-to-understand way. Here, we’ll discuss several metrics that cyber leaders can use to measure cyber risk and communicate with multiple stakeholders.
More DetailsJim Routh, Senior Advisor, SecurityScorecard
Executive Viewpoint, Security Ratings