Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

What is Digital Forensics? Everything You Need to Know: How It Supports Cybersecurity, Incident Response, and Compliance

June 24, 2022

What is Digital Forensics? Everything You Need to Know: How It Supports Cybersecurity, Incident Response, and Compliance
Digital forensics is a branch of forensics that focuses on finding, preserving, documenting, and analyzing any criminal evidence stored on digital devices.
Tech Center
Incident Response vs. Disaster Recovery: Key Differences

June 23, 2022

Incident Response vs. Disaster Recovery: Key Differences
While they both fight the same threats to protect your business from a security threat and breach, incident response vs. disaster recovery plans have their differences. Learn more.
Tech Center
What is Vendor Tiering? Tips to Improve Your Vendor Risk Management

June 22, 2022

What is Vendor Tiering? Tips to Improve Your Vendor Risk Management
Vendor tiering is the process of identifying, analyzing, and classifying vendors based on their security risks. Learn how your business can improve your vendor risk management.
Tech Center
The Value of Communicating Risk Meaningfully Across the Business

June 20, 2022

The Value of Communicating Risk Meaningfully Across the Business
While cybersecurity might be under the umbrella of IT, make no mistake: a breach will impact the entire business, making it the entire organization’s responsibility to be able to understand and take action on risk.\r\n\r\nYour organization needs to have a holistic view of risk that can enable technical and business conversations about cyber risk. By understanding not just the nuts and bolts of an exploit, but the impact it can have on employees, customers, and revenue, security experts and business leaders alike can then prioritize actions, budgets, and initiatives.
Tech Center
5 Ways to Effectively Prevent Data Leakage

May 25, 2022

5 Ways to Effectively Prevent Data Leakage
Explore how you can stop data leakage with a solution that identifies and combats vulnerabilities inherent within your business. Learn more.
Tech Center
Understanding the Basics of Cyber Insurance: What You Need to Know

March 7, 2022

Understanding the Basics of Cyber Insurance: What You Need to Know
Learn more about the basics of cyber insurance and how it can — and can’t — help your organization recover from a cyber incident.
Cyber Insurance
Executive Viewpoint
Tech Center
What is Cyber Hygiene? Definition, Benefits, & Best Practices

March 2, 2022

What is Cyber Hygiene? Definition, Benefits, & Best Practices
Cyber hygiene is the collection of regular best practices that an organization undertakes to keep its network and data safe and secure. Learn all about it.
Tech Center
25 Common Types of Malware & How To Identify Them

February 16, 2022

25 Common Types of Malware & How To Identify Them
Explore the several types of malware and the traits that will help your organization identify each. Read more on SecurityScorecard’s blog.
Tech Center
6 Benefits of Effective Risk Management in Cybersecurity

February 7, 2022

6 Benefits of Effective Risk Management in Cybersecurity
Having an effective cybersecurity risk management program is much more than an option. Rather, it’s a crucial component of business continuity. Explore the top benefits now.
Tech Center
What is a Botnet Attack? 5 Ways to Prevent It

February 2, 2022

What is a Botnet Attack? 5 Ways to Prevent It
A botnet attack happens when a group of devices is infected by malware that is under the control of a hacker. Explore ways to prevent botnet attacks from happening now.
Tech Center
What is Third Party Due Diligence? What You Should Know

January 31, 2022

What is Third Party Due Diligence? What You Should Know
Due diligence is the investigation that a person or business is expected to take on before entering into an agreement with a third-party. Learn more.
Tech Center
How to Measure Risk Management Performance: KPI & Metrics

January 3, 2022

How to Measure Risk Management Performance: KPI & Metrics
Cybersecurity professionals are facing an unprecedented amount of scrutiny. Not only are they responsible for securing and protecting their organizations, but they also need to prove that their ideas and strategies for doing so have a meaningful impact. This can be hard when the threat landscape is constantly changing and… Read More
Security Ratings
Tech Center
First-Party vs Third-Party Cyber Insurance: What’s the Difference?

December 6, 2021

First-Party vs Third-Party Cyber Insurance: What’s the Difference?
First-party and third-party cyber insurance work to protect your business from serious financial and reputational damage that may result from a data breach. Learn more.
Cyber Insurance
Executive Viewpoint
Tech Center
Guide to Performing a Data Risk Assessment

November 24, 2021

Guide to Performing a Data Risk Assessment
Check out this guide to performing a data risk assessment that explains what it is, why it’s important, and how to engage in one. Read more
Tech Center
What is Compliance Management and Why Is It Important?

November 11, 2021

What is Compliance Management and Why Is It Important?
Compliance management is the process of monitoring an organization’s network to ensure they comply with legal and industry requirements. Learn more.
Tech Center
What are Information Security Controls?

November 11, 2021

What are Information Security Controls?
What are information security controls and what type does my organization need? Learn more on SecurityScorecard’s blog.
Tech Center
The Evolution of Cybersecurity Solutions and Threats

October 25, 2021

The Evolution of Cybersecurity Solutions and Threats
To know where cybersecurity solutions are headed, we must know where they came from. Learn more about the evolution of cybersecurity solutions.
Cyber Threat Intelligence
Security Ratings
Assessing Cyber Risk: 13 Critical Questions for the Board

October 6, 2021

Assessing Cyber Risk: 13 Critical Questions for the Board
Boards of Directors constantly need to be educated about and aware of their organizations’ cybersecurity posture. Check out these 13 questions for the board that provide visibility into the company’s strategy and help assess cyber risk.
Tech Center
What are Threat Intelligence Feeds?

October 4, 2021

What are Threat Intelligence Feeds?
Threat intelligence feeds are continuous data streams filled with threat intelligence, providing real-time information on cybersecurity threats. Learn more.
Cyber Threat Intelligence
Tech Center
A Guide to Cloud Data Security Best Practices

September 27, 2021

A Guide to Cloud Data Security Best Practices
Explore best practices for cloud data security that can guide your organization toward a secured cloud infrastructure and mitigate any security risks.
Tech Center
What is Security Compliance Management?

September 15, 2021

What is Security Compliance Management?
Security compliance management is the process of monitoring and assessing systems, devices, and networks to ensure they comply with regulatory requirements, as well as industry and local cybersecurity standards. Learn more on SecurityScorecard’s blog.
Tech Center