Learning Center
Learn more about the industry and SecurityScorecard.
-
Blog, Learning CenterFirst-Party vs Third-Party Cyber Insurance: What’s the Difference?
December 6, 2021First-party and third-party cyber insurance work to protect your business from serious financial and reputational damage that may result from a data breach. Learn more.
More DetailsCyber Insurance, Tech Center -
Learning CenterGuide to Performing a Data Risk Assessment
November 24, 2021Check out this guide to performing a data risk assessment that explains what it is, why it’s important, and how to engage in one. Read more
More DetailsTech Center -
Learning CenterWhat are Information Security Controls?
November 11, 2021What are information security controls and what type does my organization need? Learn more on SecurityScorecard's blog.
More DetailsTech Center -
Learning CenterWhat is Compliance Management and Why Is It Important?
November 11, 2021Compliance management is the process of monitoring an organization’s network to ensure they comply with legal and industry requirements. Learn more.
More DetailsTech Center -
Blog, Learning CenterThe Evolution of Cybersecurity Solutions and Threats
October 25, 2021To know where cybersecurity solutions are headed, we must know where they came from. Learn more about the evolution of cybersecurity solutions.
More DetailsCyber Threat Intelligence, Security Ratings -
Learning CenterAssessing Cyber Risk: 13 Critical Questions for the Board
October 6, 2021Boards of Directors constantly need to be educated about and aware of their organizations’ cybersecurity posture. Check out these 13 questions for the board that provide visibility into the company’s strategy and help assess cyber risk.
More DetailsTech Center -
Learning CenterA Guide to Cloud Data Security Best Practices
September 27, 2021Explore best practices for cloud data security that can guide your organization toward a secured cloud infrastructure and mitigate any security risks.
More DetailsTech Center -
Learning CenterWhat is Security Compliance Management?
September 15, 2021Security compliance management is the process of monitoring and assessing systems, devices, and networks to ensure they comply with regulatory requirements, as well as industry and local cybersecurity standards. Learn more on SecurityScorecard's blog.
More DetailsSarah Daily
Tech Center -
Learning CenterWhat are the Types of Risk Assessments and When to Use Them?
September 8, 2021Creating a cyber-resilient organization means understanding your security risks and how to mitigate them. Learn the different types of risk assessments and how to use them so you can make better-informed decisions for your organization.
More DetailsTech Center -
Learning CenterHow to Design an Effective Cybersecurity Policy
August 11, 2021More DetailsTech Center -
Learning Center8 Internet of Things Threats and Risks to Be Aware of
August 4, 2021More DetailsTech Center -
Learning Center10 Common Cyber Attack Vectors and How to Avoid Them
July 28, 2021When it comes to cybercrime, cybercriminals are constantly changing their tactics. Think back to 10 years ago; malware sites — malicious sites that attempt to install malware on a device – were a common attack vector. At the same time, sophisticated ransomware attacks on organizations were rare. Often, ransomware was used to target individuals, sometimes blackmailing them for having been on unsavory sites and asking for a few hundred dollars in ransom.
More DetailsTech Center