Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Learning Center
5 Network Segmentation Best Practices to Maximize Cybersecurity
February 17, 2021While preventing attacks is the goal of cybersecurity, it’s also important to realize an attack can happen and make plans to mitigate the impact of a successful breach. Check out these network segmentation best practices to maximize cybersecurity.
More DetailsTech Center -
Learning Center
What Is an Attack Vector? 8 Common Examples
January 25, 2021Attack vectors are the means or tactics used by cyber criminals to gain unauthorized access to a network. Explore common attack vectors and learn how you can defend against them.
More DetailsAttack Surface Management, Tech Center -
Learning Center
What’s Wrong with Two-Factor Authentication?
November 17, 2020Though requiring an extra identifier does deter some hackers from attacking systems defended with two-factor authentication, it is not always your safest option. Find out more on SecurityScorecard's blog.
More DetailsTech Center -
Learning Center
How Can You Secure Risky Open Ports?
October 1, 2020Open network ports enable organizations to adopt cloud strategies. However, each port is technically a small gateway into an organization’s IT stack. Learn how you can security risky open ports.
More DetailsTech Center -
Learning Center
What’s the Role of Cybersecurity in Procurement?
September 23, 2020As a company’s IT stack adds more e-procurement tools, the role of cybersecurity in the procurement process becomes integral to protecting sensitive corporate data and mitigating the risks within a supply chain. Learn more on SecurityScorecard's blog.
More DetailsTech Center -
Blog, Learning Center
Healthcare IT Security and Compliance in 2024 and Beyond: A Comprehensive Guide
October 17, 2024The healthcare industry remains a prime target for cyberattacks. As the industry navigates the digital landscape, ensuring cybersecurity compliance is paramount to protecting patient privacy and maintaining operational integrity.
More DetailsHealthcare, Services, Tech Center -
Blog, Learning Center
What is a Third-Party Vendor? Tips for Managing Vendor Risk
July 23, 2020A third-party vendor is any company or entity with a direct written contract to provide goods or services to your customers on your behalf. Explore 3 best practices for third-party risk management.
More DetailsAttack Surface Management, Tech Center -
Learning Center
8 Effective Vendor Due Diligence Best Practices
July 14, 2020Vendors often have access to sensitive company information, so vendor due diligence is crucial to mitigating risk. Explore 8 things to consider during the vendor due diligence process.
More DetailsTech Center -
Learning Center
5 Ways Data Breaches Affect Organizations
May 18, 2020While organizations often focus their attention on a data breach’s impact on their bottom line, there are several other other ways a cyber attack can impact a company. Read more on SecurityScorecard's blog.
More DetailsTech Center -
Blog, Learning Center
The CISO’s Guide to Reporting Cybersecurity to the Board
April 6, 2020Being able to effectively report on cybersecurity is a key component to every CISOs job. Learn how CISOs can ensure that their board presentations are beneficial.
More DetailsTech Center -
Learning Center
What is Cybersecurity Analytics? Definition & Use Cases
April 3, 2020Cybersecurity analytics is an approach that uses data aggregation, attribution, and analysis to extract the information needed for proactive cybersecurity. Explore benefits and use cases.
More DetailsSecurity Ratings, Tech Center -
Learning Center
The Role of Cybersecurity in Enterprise Risk Management (ERM)
March 24, 2020An enterprise risk management program should include a cybersecurity element so organizations can identify relationships between risk and impact across its ecosystem.
More DetailsTech Center