Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

Understanding the Importance of Cybersecurity Due Diligence

September 13, 2021

Understanding the Importance of Cybersecurity Due Diligence
Organizations increasingly rely on third- and fourth-party vendors and service providers to carry out day-to-day operations, expanding their exposure to cyber threats. After analyzing over 12 million companies’ security postures and supporting thousands of M&A transactions, SecurityScorecard has learned that traditional cybersecurity due diligence… Read More
Tech Center
Best Practices for Trusted Third-Party Risk Management

September 9, 2021

Best Practices for Trusted Third-Party Risk Management
Check out these best practices to managing third-party risk for your organization. Learn more.
Supply Chain Cyber Risk
Tech Center
What are the Types of Risk Assessments and When to Use Them?

September 8, 2021

What are the Types of Risk Assessments and When to Use Them?
Creating a cyber-resilient organization means understanding your security risks and how to mitigate them. Learn the different types of risk assessments and how to use them so you can make better-informed decisions for your organization.
Tech Center
What is the CIA Triad? Definition, Importance, & Examples

September 1, 2021

What is the CIA Triad? Definition, Importance, & Examples
What is the CIA Triad? Definition, Importance, & Examples to guide an organization’s security procedures and policies. Learn more below!
Tech Center
Compliance vs Risk Management: What You Need to Know

August 25, 2021

Compliance vs Risk Management: What You Need to Know
People hear the terms compliance and risk management and assume they are the same. Learn more about the difference between compliance and risk management now.
Tech Center
10 Best Practices to Prevent DDoS Attacks

August 16, 2021

10 Best Practices to Prevent DDoS Attacks
Distributed Denial of Service (DDoS) attacks spiked in recent years, fueled by the growing reliance on digital infrastructure and the expanding attack surface created by hybrid work environments and always-online services. According to a report from NETSCOUT, almost… Read More
Tech Center
How to Design an Effective Cybersecurity Policy

August 11, 2021

How to Design an Effective Cybersecurity Policy
Every year, more than 34 percent of organizations worldwide are affected by insider threats. For that reason, cybersecurity needs to be a priority and concern for each employee within an organization, not only the upper-level management team and IT professionals. Employees tend to be the weakest link… Read More
Tech Center
8 Internet of Things Threats and Risks to Be Aware of

August 4, 2021

8 Internet of Things Threats and Risks to Be Aware of
The internet of things (IoT) is a highly developed space that is home to a vast amount of sensitive data, making it a very attractive target for cybercriminals. Threats and risks continue to evolve as hackers come up with new ways to breach unsecured systems — posing a threat to… Read More
Tech Center
10 Common Cyber Attack Vectors and How to Avoid Them

July 28, 2021

10 Common Cyber Attack Vectors and How to Avoid Them
When it comes to cybercrime, cybercriminals are constantly changing their tactics. Think back to 10 years ago; malware sites — malicious sites that attempt to install malware on a device – were a common attack vector. At the same time, sophisticated ransomware attacks on organizations were rare. Often, ransomware was used to target individuals, sometimes blackmailing them for having been on unsavory sites and asking for a few hundred dollars in ransom.\r\n\r\n
Tech Center
8 Top Strategies for Cybersecurity Risk Mitigation

July 12, 2021

8 Top Strategies for Cybersecurity Risk Mitigation
In recent years, there has been a clear rise in threat volume and sophistication as many cybercriminals shift to techniques that can effectively evade detection and easily go after high-value targets. IoT devices are becoming a focus for threat actors, and threats related to credential harvesting and ransomware are also… Read More
Tech Center
16 Countries with GDPR-like Data Privacy Laws

July 8, 2021

16 Countries with GDPR-like Data Privacy Laws
Coming into force on May 25th, 2018, the General Data Protection Regulation (GDPR) was a landmark for data protection. Trading blocs, governments, and privacy organizations took note, and over the last three years, GDPR has inspired new data privacy legislation worldwide. In my view, there are two very… Read More
Tech Center
What is the ICT Supply Chain? Things Your Business Needs to Know

June 28, 2021

What is the ICT Supply Chain? Things Your Business Needs to Know
The ICT supply chain is the sequence of actions that transform raw resources into ICT products and services such as computer hardware, software, and subscriptions. Learn more.
Tech Center
What is Access Control? Components and Types

June 22, 2021

What is Access Control? Components and Types
Digital transformation changes the perimeter. When organizations had all their applications on-premises, the network firewall kept the right users inside the gate and malicious actors outside. However, the move to the cloud changed all that. In today’s hyper-connected ecosystem, understanding the components and types of access control can help you strengthen security.
Tech Center
Top 7 Security Risks of Cloud Computing

June 21, 2021

Top 7 Security Risks of Cloud Computing
Many businesses are shifting workloads to the cloud in an effort to increase efficiency and streamline workloads. In fact, according to the Flexera 2021 State of the Cloud Report, roughly 90% of enterprises anticipate cloud usage will expand even further as a result of COVID-19. While cloud computing… Read More
Tech Center
JBS Ransomware Attack Started in March and Much Larger in Scope than Previously Identified

June 8, 2021

JBS Ransomware Attack Started in March and Much Larger in Scope than Previously Identified
SecurityScorecard found that the JBS ransomware attack started in March and is much larger in scope than previously identified. Check out SecurityScorecard’s research.
Cyber Threat Intelligence
STRIKE Team
KPIs for Security Operations & Incident Response

June 7, 2021

KPIs for Security Operations & Incident Response
Creating a resilient cybersecurity program means understanding your current security posture and knowing what you want your future cybersecurity posture to look like. In today’s constantly changing threat landscape, cybersecurity maturity is the best way to mitigate security incident risks. However, understanding maturity means knowing where… Read More
Tech Center
How to Identify and Prepare for Network Security Threats and Vulnerabilities

May 26, 2021

How to Identify and Prepare for Network Security Threats and Vulnerabilities
Network security threats are constantly evolving. Find out how to identify network threats and address vulnerabilities to protect your organization.
Tech Center
Top 11 IoT Cybersecurity Challenges Facing Businesses

May 17, 2021

Top 11 IoT Cybersecurity Challenges Facing Businesses
As companies increasingly adopt Internet of Things (IoT) devices to enable business operations, they need to consider the following IoT cybersecurity risks and find ways to adequately mitigate them. Learn more.
Tech Center
Integrating Cybersecurity into Business Continuity Planning

May 12, 2021

Integrating Cybersecurity into Business Continuity Planning
By integrating cybersecurity into business continuity planning (BCP), organizations can enable collaboration across teams. Explore tips for combining BCP and cybersecurity.
Tech Center
14 Types of Phishing Attacks and How to Identify Them

May 5, 2021

14 Types of Phishing Attacks and How to Identify Them
Learn more about 14 Types of Phishing Attacks and How to Identify Them
Tech Center
How to Perform an Information Security Gap Analysis

May 3, 2021

How to Perform an Information Security Gap Analysis
The cyber threat landscape is ever-evolving, and the security controls that worked for your organization yesterday may no longer be sufficient today. Cyberattacks happen every second, and a security breach can result in the loss of clients’ confidential information, potentially leading to financial penalties and a damaged reputation. Read More
Tech Center