Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Research
A Deep Dive Into Medusa Ransomware
May 22, 2023Medusa ransomware appeared in June 2021, and it became more active this year by launchingthe “Medusa Blog” containing data leaked from victims that didn’t pay the ransom. The malwarestops a list of services and processes decrypted at runtime and deletes the Volume ShadowCopies.
More DetailsVlad Pasca
-
White Paper
SecurityScorecard’s Scoring Methodology 3.0
April 9, 2024Take a deep dive into SecurityScorecard's scoring methodology.
More DetailsSecurity Ratings -
Press
Canadian Centre for Cyber Security and SecurityScorecard Establish Partnership to Strengthen Cyber Resilience and Secure Critical Infrastructure
January 11, 2024Cyber Centre pioneers real-time visibility of national critical infrastructure using nationwide implementation of security ratings, credit scores of the digital world.
More Details -
Learning Center
How to Write Third-Party Risk Management (TPRM) Policies and Procedures
June 3, 2020As organizations set out to mature their cybersecurity programs, vendor risk management (VRM) is a primary risk mitigation strategy. However, managing third-party risk becomes overwhelming, especially as they incorporate more cloud-based vendors to help streamline business operations. While monitoring used to be based on a “trust but verify” mentality, the modern move towards “verify then trust” requires organizations to pivot their programs and become more proactive. Writing third-party risk management (TPRM) policies and procedures needs to act as the foundational guidelines for creating an effective vendor risk management strategy.
More DetailsTech Center -
Learning Center
7 Essential Third-Party Risk Management (TPRM) Tools
September 16, 2020Organizations that still rely on inefficient manual processes face a higher risk of a cyber breach, as well as reputational or regulatory repercussions. With the right TPRM tools in place, IT and security teams can streamline, and maximize the effectiveness of their tools and procedures so they can keep up with the demands of their businesses. While multiple factors will determine the exact needs of a particular organization, here are seven tools that are essential to managing any vendor ecosystem.
More DetailsTech Center -
Learning Center
10 Common Cyber Attack Vectors and How to Avoid Them
July 28, 2021When it comes to cybercrime, cybercriminals are constantly changing their tactics. Think back to 10 years ago; malware sites — malicious sites that attempt to install malware on a device – were a common attack vector. At the same time, sophisticated ransomware attacks on organizations were rare. Often, ransomware was used to target individuals, sometimes blackmailing them for having been on unsavory sites and asking for a few hundred dollars in ransom.
More DetailsTech Center -
Learning Center
4 Best Practices for Effective Reputational Risk Management
January 13, 2021Just as a strong reputation can help attract new business, a poor reputation can drive potential customers away, leading to financial loss. This is why many organizations are beginning to invest in reputational risk management programs. Here we'll outline four best practices you can follow to effectively manage reputational risk at your organization.
More DetailsTech Center -
Learning Center
The Top 7 Cyberattacks on U.S. Government A closer look at the evolving landscape of cybersecurity
September 9, 2023Cyberattacks are an increasingly significant threat to governments worldwide. This blog post examines some of the top cyberattacks on US government.
More DetailsPublic Sector, Tech Center -
Learning Center
What Is a Cybersecurity Vendor Due Diligence Questionnaire?
May 5, 2020A vendor cybersecurity due diligence questionnaire is a written assessment given to a vendor to gain a better understanding of their cybersecurity environment.
More DetailsTech Center -
Learning Center
Cybersecurity Audit vs. Cybersecurity Assessment: What’s the Difference?
October 7, 2020Cybersecurity assessments and audits are often discussed interchangeably. While the two are related, assessments and audits are distinct cybersecurity and compliance evaluation mechanisms. It’s important for security leaders to understand exactly how the two function in order to drive organizational cyber maturity and meet industry-specific regulatory requirements.
More DetailsTech Center -
Learning Center
Best Practices for Compliance Monitoring in Cybersecurity
January 2, 2020Compliance monitoring is the process of overseeing business operations to ensure your organization is aligned with various regulatory mandates. Learn how to build a compliance monitoring program.
More DetailsServices, Tech Center