Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Learning Center
What is Continuous Cybersecurity Monitoring?
November 9, 2020Recommended: Cybersecurity monitoring is a threat detection strategy that uses automation to continuously scan your IT ecosystem for control weaknesses. Learn more.
More DetailsTech Center -
Learning Center
Enterprise Cybersecurity: What it is & Why it’s Important
January 20, 2023More DetailsTech Center -
Learning Center
Vendor Risk Management vs Third Party Risk Management vs Enterprise Risk Management: What’s the Difference?
January 10, 2024Third-Party, Vendor, and Enterprise Risk Management are often used interchangeably, but they are not always the same. Learn which is right for your business.
More DetailsTech Center -
Press
SecurityScorecard Reinforces Commitment to Free Security Ratings for All Organizations
January 8, 2024SecurityScorecard today unveiled new capabilities to strengthen cybersecurity trust and transparency across the digital ecosystem. Building on a decade-long commitment to providing free security ratings for all organizations, SecurityScorecard innovations advance the industry’s most transparent, trusted, and accurate security ratings.
More DetailsSecurity Ratings -
Press
SecurityScorecard and Industry Leaders Deliver Industry-Specific Security Ratings for Telecommunications, Internet Service Providers, and Cloud Providers
SecurityScorecard today announced the industry’s first security ratings developed exclusively for telecommunications, internet service providers, and cloud providers. Through close collaboration with industry leaders, SecurityScorecard sets a new standard for cybersecurity across these critical sectors.
More DetailsSecurity Ratings -
Blog, Learning Center
What Is a Cybersecurity Audit and Why Does it Matter?
August 17, 2020As organizations adopt new digital technologies, their risk of being targeted in cyberattacks grows. The increased network complexity that comes as a result of digital innovation often creates new network gaps for cyber adversaries to exploit. If left unchecked, these risks can undermine organizational objectives which is why it is critical that businesses have effective cybersecurity programs in place. A key component to the success of these programs is the administration of cybersecurity audits.
More DetailsTech Center -
Learning Center
2025 Guide to Completing a Vendor Risk Management Questionnaire
December 7, 2023More DetailsTech Center -
Learning Center
What is Attack Surface Management?
November 23, 2020Organizations are facing increased pressure to adopt digital solutions to stay competitive. While these solutions have undoubted benefits for organizations, they also expand their potential attack surface and expose them to increased levels of cyber risk. To help stay protected, many organizations are adopting cyber attack surface management programs that work to continually assess their networks for potential threats. Cyber attack surface management is the process of identifying all networks within a business that can be infiltrated, classifying areas of risk, prioritizing high-risk areas, and continuously monitoring an organization’s attack surface.
More DetailsAttack Surface Management, Tech Center -
Learning Center
16 Countries with GDPR-like Data Privacy Laws
July 8, 2021More DetailsMike Woodward
Tech Center -
Blog, Learning Center
Fortinet Fortigate Vulnerability CVE-2023-27997: How to Surface Exposed Devices and Mitigate the Threat
June 23, 2023Recently, a critical vulnerability tracked as CVE-2023-27997 was identified in Fortinet Fortigate appliances. This vulnerability has been exploited by the Chinese APT group Volt Typhoon, among others, targeting governments and organizations worldwide. As a result, Fortinet has released an urgent patch for affected systems. For a more detailed understanding of this vulnerability and the corresponding patch, you can read this Fortinet blog post.
More DetailsCyber Threat Intelligence -
Learning Center
What are the Key Drivers of Enterprise Risk Management (ERM)?
March 26, 2020Learn the key drivers of enterprise risk management and why business and security leaders might not be communicating well when it comes to risk and threats.
More DetailsTech Center