
Learning Center
Learn more about the industry and SecurityScorecard.
-
Blog, Learning Center
What is HIPAA Compliance? A Complete Guide
September 12, 2025What is HIPAA compliance? Learn essential requirements, common violations, and best practices for healthcare data protection and security.
More DetailsSteve Cobb
Tech Center -
Blog, Learning Center
What is a Cybersecurity Posture and How Can You Evaluate It?
September 12, 2025Organizations across industries struggle to maintain robust security postures. While tremendous strides have been made in security technology, the fundamentals of establishing and maintaining a strong cybersecurity posture remain elusive for many organizations.
More DetailsSteve Cobb
Tech Center -
Blog, Learning Center, STRIKE
When SaaS Trust Becomes a Threat: Insights from the Salesloft Drift Compromise
September 10, 2025The STRIKE team has been analyzing the Salesloft Drift breach that spread into Salesforce environments. Discover what the breach tells us about supply chain security, how attackers abused OAuth tokens, what data is exposed, and defensive actions to take next.
More DetailsRyan Sherstobitoff
STRIKE Team -
Learning Center
Patch Cadence & Patch Management Best Practices
August 18, 2025Learn patch management best practices to reduce vulnerabilities through effective patch cadence in your cybersecurity operations.
More DetailsTech Center -
Learning Center
25 Common Types of Malware & How To Identify Them
August 18, 2025Explore the several types of malware and the traits that will help your organization identify each. Read more on SecurityScorecard's blog.
More DetailsTech Center -
Learning Center
How Do You Use the SIG Questionnaire for Better Third-Party Risk Assessment?
August 18, 2025Learn how to use the SIG Questionnaire to accelerate vendor risk assessments, align with compliance frameworks, and reduce third-party cyber risk.
More DetailsTech Center -
Learning Center
How to Identify Phishing Emails? Signs of Phishing
August 18, 2025Discover the latest phishing email signs & prevention tactics for 2025. Learn AI-powered detection methods to protect your organization.
More Details -
Blog, Learning Center, STRIKE
From the Depths of the Shadows: IRGC and Hacker Collectives Of The 12-Day War
August 5, 2025From reconnaissance to propaganda to payloads, this is how Iran’s digital foot soldiers mobilized across borders and platforms during the war with Israel in June 2025.
More DetailsSTRIKE Team -
Learning Center
What is Mobile Forensics? Definition, Processes, & Examples
June 30, 2025More DetailsTech Center -
Learning Center
What is Continuous Cybersecurity Monitoring?
June 30, 2025Recommended: Cybersecurity monitoring is a threat detection strategy that uses automation to continuously scan your IT ecosystem for control weaknesses. Learn more.
More DetailsTech Center -
Learning Center
What Is a Cybersecurity Vendor Due Diligence Questionnaire?
June 30, 2025A vendor cybersecurity due diligence questionnaire is a written assessment given to a vendor to gain a better understanding of their cybersecurity environment.
More DetailsTech Center -
Learning Center
What is Cybersecurity Analytics? Definition & Use Cases
June 30, 2025Cybersecurity analytics is an approach that uses data aggregation, attribution, and analysis to extract the information needed for proactive cybersecurity. Explore benefits and use cases.
More DetailsSecurity Ratings, Tech Center