Learning Center
Learn more about the industry and SecurityScorecard.
-
Learning CenterHow Do You Use the SIG Questionnaire for Better Third-Party Risk Assessment?
August 18, 2025Learn how to use the SIG Questionnaire to accelerate vendor risk assessments, align with compliance frameworks, and reduce third-party cyber risk.
More DetailsTech Center -
Learning CenterHow to Identify Phishing Emails? Signs of Phishing
August 18, 2025Discover the latest phishing email signs & prevention tactics for 2025. Learn AI-powered detection methods to protect your organization.
More Details -
Blog, Learning Center, Research, Resources, STRIKEFrom the Depths of the Shadows: IRGC and Hacker Collectives Of The 12-Day War
August 5, 2025From reconnaissance to propaganda to payloads, this is how Iran’s digital foot soldiers mobilized across borders and platforms during the war with Israel in June 2025.
More DetailsSTRIKE Team -
Learning CenterWhat is Mobile Forensics? Definition, Processes, & Examples
June 30, 2025More DetailsTech Center -
Learning CenterWhat is Continuous Cybersecurity Monitoring?
June 30, 2025Recommended: Cybersecurity monitoring is a threat detection strategy that uses automation to continuously scan your IT ecosystem for control weaknesses. Learn more.
More DetailsTech Center -
Learning CenterWhat Is a Cybersecurity Vendor Due Diligence Questionnaire?
June 30, 2025A vendor cybersecurity due diligence questionnaire is a written assessment given to a vendor to gain a better understanding of their cybersecurity environment.
More DetailsTech Center -
Learning CenterWhat is Cybersecurity Analytics? Definition & Use Cases
June 30, 2025Cybersecurity analytics is an approach that uses data aggregation, attribution, and analysis to extract the information needed for proactive cybersecurity. Explore benefits and use cases.
More DetailsSecurity Ratings, Tech Center -
Learning CenterWhat is Domain Hijacking and How Do I Prevent it?
June 30, 2025Your domain name is not just a web address; it represents your brand, your reputation, and often, your livelihood. However, with the increasing value of domain names, they have become targets for cybercriminals seeking to exploit vulnerabilities for their gain. One such threat is domain hijacking – a serious issue that can have significant repercussions if not addressed promptly. Here, we'll delve into what domain hijacking entails and explore practical steps to prevent it from happening to you.
More DetailsTech Center -
Learning Center10 Cybersecurity Criteria for Smarter Vendor Selection
June 27, 2025Learn the 10 most critical cybersecurity criteria to include in your vendor selection process. Make smarter, risk-informed decisions before onboarding third parties.
More Details -
Learning CenterWhat is the Difference Between IT Risk Management and Cybersecurity?
June 25, 2025Explore how IT risk management and cybersecurity differ—and where they overlap. Learn how to align both for a stronger, more resilient organization.
More Details -
Learning CenterBuilding a Vendor Risk Management Program: Strategies for Success
June 24, 2025Learn how to build a vendor risk management (VRM) program that aligns with modern cyber threats. Discover essential steps, tools, and continuous monitoring strategies for supply chain protection.
More Details -
Blog, Learning Center, Research, Resources, STRIKEUnmasking A New China-Linked Covert ORB Network: Inside the LapDogs Campaign
June 23, 2025SecurityScorecard’s STRIKE team uncovered a new China-Nexus ORB Network targeting the United States and Southeast Asia. Read the report to gain an in-depth look at the LapDogs ORB network, its custom malware, and its role in cyberespionage.
More DetailsSTRIKE Team