Learning Center
Learn more about the industry and SecurityScorecard.
-
Learning CenterHacker Subcultures: Unmasking the Motivations and Methods
February 5, 2024Explore hacker subcultures and their impact on cybersecurity, from ethical white hats to disruptive script kiddies, in this insightful read.
More DetailsTech Center -
Blog, Learning CenterFrom Confusion to Clarity: Red Sift Breaks Down Google and Yahoo’s Email Security Requirements
February 1, 2024Understand how to comply with Google and Yahoo's new email security requirements and ensure your organization's emails are delivered effectively. Discover how SecurityScorecard can help.
More DetailsSupply Chain Cyber Risk -
Learning CenterHow to Perform A Cybersecurity Risk Analysis in 2024
January 2, 2024Identify, manage, and safeguard data, and assets that could be vulnerable to a cyberattack. Learn how to perform a cyber security risk analysis.
More DetailsTech Center -
Blog, Learning CenterOptimizing Incident Response with Advanced Threat Intelligence
December 14, 2023Here's how modern threat intelligence tools can refine and improve an organization's incident response strategies.
More DetailsCyber Threat Intelligence, Tech Center -
Learning CenterZero‑Day Attack Prevention: How to Prepare
October 11, 2023Learn how to prevent zero‑day attacks with hardening, detection prep, virtual patching, and a 24–72 hour response checklist, even before a patch exists.
More DetailsTech Center -
Blog, Learning CenterWhat is the Cost of Cyber Liability Insurance?
September 20, 2023The cost of cyber liability insurance can vary based on factors such as business size, industry, risk profile, and coverage needs.
More DetailsCyber Insurance, Tech Center -
Blog, Learning CenterTop 5 Security Vulnerabilities of 2023
August 7, 2023More DetailsJared Smith, Ph.D., Senior Director, SecurityScorecard Threat Research
Cyber Threat Intelligence, Supply Chain Cyber Risk -
Blog, Learning Center3 Takeaways: New SEC Cyber Risk Disclosure Rules
July 27, 2023Blog: New rules require a detailed assessment of supply chain and organizational resilience
More DetailsServices -
Blog, Learning CenterFortinet Fortigate Vulnerability CVE-2023-27997: How to Surface Exposed Devices and Mitigate the Threat
June 23, 2023Recently, a critical vulnerability tracked as CVE-2023-27997 was identified in Fortinet Fortigate appliances. This vulnerability has been exploited by the Chinese APT group Volt Typhoon, among others, targeting governments and organizations worldwide. As a result, Fortinet has released an urgent patch for affected systems. For a more detailed understanding of this vulnerability and the corresponding patch, you can read this Fortinet blog post.
More DetailsCyber Threat Intelligence -
Learning CenterEnterprise Cybersecurity: What it is & Why it’s Important
January 20, 2023More DetailsTech Center -
Learning CenterHackers Are Using These 3 Techniques to Bypass MFA
December 7, 2022Multi-factor authentication (MFA) is an essential security measure, but here are some frequently-used methods cyber-attackers leverage to bypass MFA.
More DetailsTech Center -
Learning Center9 Steps to Mitigate Ransomware Attacks for Your Business
November 30, 2022Ransomware attacks are a top concern for many businesses as the threat landscape expands. Follow these 9 steps to help mitigate the risk for your business.
More DetailsTech Center