Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

Cybersecurity Audit vs. Cybersecurity Assessment: What’s the Difference?

October 7, 2020

Cybersecurity Audit vs. Cybersecurity Assessment: What’s the Difference?
Cybersecurity assessments and audits are often discussed interchangeably. While the two are related, assessments and audits are distinct cybersecurity and compliance evaluation mechanisms. It’s important for security leaders to understand exactly how the two function in order to drive organizational cyber maturity and meet industry-specific regulatory requirements.
Tech Center
How Can You Secure Risky Open Ports?

October 1, 2020

How Can You Secure Risky Open Ports?
Open network ports enable organizations to adopt cloud strategies. However, each port is technically a small gateway into an organization’s IT stack. Learn how you can security risky open ports.
Tech Center
What’s the Role of Cybersecurity in Procurement?

September 23, 2020

What’s the Role of Cybersecurity in Procurement?
As a company’s IT stack adds more e-procurement tools, the role of cybersecurity in the procurement process becomes integral to protecting sensitive corporate data and mitigating the risks within a supply chain. Learn more on SecurityScorecard’s blog.
Tech Center
7 Essential Third-Party Risk Management (TPRM) Tools

September 16, 2020

7 Essential Third-Party Risk Management (TPRM) Tools
Organizations that still rely on inefficient manual processes face a higher risk of a cyber breach, as well as reputational or regulatory repercussions. With the right TPRM tools in place, IT and security teams can streamline, and maximize the effectiveness of their tools and procedures so they can keep up with the demands of their businesses.\r\n\r\nWhile multiple factors will determine the exact needs of a particular organization, here are seven tools that are essential to managing any vendor ecosystem.
Tech Center
How to Justify Your Cybersecurity Budget

September 14, 2020

How to Justify Your Cybersecurity Budget
Organizations know they need cybersecurity, but security leaders still struggle to get the funding necessary. CISOs looking to justify their cybersecurity budgets need ways to prove return on investment, provide metrics for measuring success, and ensure continued year-over-year value.
Tech Center
A Security Operations Center (SOC) Report Template for the C-Suite

September 2, 2020

A Security Operations Center (SOC) Report Template for the C-Suite
The Security Operations Center (SOC) is an important element of any organization’s cybersecurity strategy. Staffed by a team of security analysts and incident responders who work together to detect, analyze, respond to, report on, and prevent data breaches. It’s an important role — the SOC is a… Read More
Tech Center
Patch Cadence & Patch Management Best Practices

August 31, 2020

Patch Cadence & Patch Management Best Practices
Learn patch management best practices to reduce vulnerabilities through effective patch cadence in your cybersecurity operations.
Tech Center
What Is a Cybersecurity Audit and Why Does it Matter?

August 17, 2020

What Is a Cybersecurity Audit and Why Does it Matter?
A cybersecurity audit is essential to protecting your organization. Learn key steps, tools, and considerations to perform an effective audit in 2025.
Tech Center
What is a Third-Party Vendor? Tips for Managing Vendor Risk

July 23, 2020

What is a Third-Party Vendor? Tips for Managing Vendor Risk
Third-party vendors play a critical role in cybersecurity exposure. Learn how to define, classify, and manage third-party relationships effectively.
Attack Surface Management
Tech Center
How to Use the National Institute of Standards and Technology (NIST) Cybersecurity Framework to Assess Vendor Security

July 16, 2020

How to Use the National Institute of Standards and Technology (NIST) Cybersecurity Framework to Assess Vendor Security
Learn how to use the NIST Framework to streamline vendor security assessments.
Tech Center
8 Effective Vendor Due Diligence Best Practices

July 14, 2020

8 Effective Vendor Due Diligence Best Practices
Vendors often have access to sensitive company information, so vendor due diligence is crucial to mitigating risk. Explore 8 things to consider during the vendor due diligence process.
Tech Center
The 2 Types of Risk Assessment Methodology

June 15, 2020

The 2 Types of Risk Assessment Methodology
Discover how a balanced risk assessment methodology helps organizations quantify cyber risk, improve resilience, and enhance security posture.
Tech Center
How to Write Third-Party Risk Management (TPRM) Policies and Procedures

June 3, 2020

How to Write Third-Party Risk Management (TPRM) Policies and Procedures
As organizations set out to mature their cybersecurity programs, vendor risk management (VRM) is a primary risk mitigation strategy. However, managing third-party risk becomes overwhelming, especially as they incorporate more cloud-based vendors to help streamline business operations. While monitoring used to be based on a “trust but verify” mentality, the modern move towards “verify then trust” requires organizations to pivot their programs and become more proactive. Writing third-party risk management (TPRM) policies and procedures needs to act as the foundational guidelines for creating an effective vendor risk management strategy.
Tech Center
5 Ways Data Breaches Affect Organizations

May 18, 2020

5 Ways Data Breaches Affect Organizations
While organizations often focus their attention on a data breach’s impact on their bottom line, there are several other other ways a cyber attack can impact a company. Read more on SecurityScorecard’s blog.
Tech Center
What Is a Cybersecurity Vendor Due Diligence Questionnaire?

May 5, 2020

What Is a Cybersecurity Vendor Due Diligence Questionnaire?
A vendor cybersecurity due diligence questionnaire is a written assessment given to a vendor to gain a better understanding of their cybersecurity environment.
Tech Center
What is the Difference Between Information Security vs Cybersecurity?

May 4, 2020

What is the Difference Between Information Security vs Cybersecurity?
Cybersecurity and information security are often used interchangeably, but they have distinct roles in protecting your organization. Learn the key differences in 2025 and why they both matter.
Tech Center
Understanding the Importance of Cybersecurity Due Diligence

April 20, 2020

Understanding the Importance of Cybersecurity Due Diligence
Many organizations rely on third-party vendors for day-to-day operations, which opens them up to higher levels of risks. Learn why the cybersecurity due diligence process is critical.
Tech Center
The CISO’s Guide to Reporting Cybersecurity to the Board

April 6, 2020

The CISO’s Guide to Reporting Cybersecurity to the Board
Being able to effectively report on cybersecurity is a key component to every CISOs job. Learn how CISOs can ensure that their board presentations are beneficial.
Tech Center
What is Cybersecurity Analytics? Definition & Use Cases

April 3, 2020

What is Cybersecurity Analytics? Definition & Use Cases
Cybersecurity analytics is an approach that uses data aggregation, attribution, and analysis to extract the information needed for proactive cybersecurity. Explore benefits and use cases.
Security Ratings
Tech Center
What are the Key Drivers of Enterprise Risk Management (ERM)?

March 26, 2020

What are the Key Drivers of Enterprise Risk Management (ERM)?
Learn the key drivers of enterprise risk management and why business and security leaders might not be communicating well when it comes to risk and threats.
Tech Center
The Role of Cybersecurity in Enterprise Risk Management (ERM)

March 24, 2020

The Role of Cybersecurity in Enterprise Risk Management (ERM)
An enterprise risk management program should include a cybersecurity element so organizations can identify relationships between risk and impact across its ecosystem.
Tech Center