Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Learning Center
What is the Zero Trust Security Model?
February 14, 2024Discover how the Zero Trust Security Model is redefining cybersecurity by emphasizing verification across identity, devices, and networks.
More DetailsTech Center -
Press
SecurityScorecard Continues Leadership of the Security Ratings Market, New Solutions Drive Massive Growth Leading Into 2024
February 14, 2024SecurityScorecard announced significant momentum coming into 2024, driven by strong new customer acquisition, significantly larger deal sizes, and strong customer expansion. Expanding on 2023 success, SecurityScorecard launched solutions in adjacent markets, including threat intelligence and external attack surface management.
More Details -
Blog
Love in the Time of Cyber Threats: Romance Scams and Dating App Cybersecurity
February 13, 2024As the digital attack surface expands, organizations and individuals worldwide face the nonstop threat of cyberattacks, phishing scams, and other cyber vulnerabilities. And with Valentine’s Day here, romance scams — especially ones originating online — are intensifying. With that in mind, SecurityScorecard’s researchers took a close look at the world of dating app security and romance scams to protect people—and their hearts—during Valentine’s Day.
More DetailsDr. Jared Smith, Distinguished Engineer, R&D Strategy
Cyber Threat Intelligence -
Press
United Arab Emirates Cybersecurity: Top Companies Exposed to Supply Chain Breaches
February 11, 2024SecurityScorecard today released a comprehensive analysis of the cybersecurity landscape of the largest companies in the United Arab Emirates (UAE). SecurityScorecard threat hunters and data scientists used the largest proprietary risk & threat intelligence dataset on the planet to analyse third and fourth-party breaches among the UAE’s 30 largest companies.
More Details -
Webinar
Cybersecurity Spending and Threat Volume: Are We Spinning Our Wheels?
February 8, 2024More DetailsCyber Threat Intelligence -
Learning Center
Securing the Vault: Cybersecurity in the Financial Sector
February 8, 2024In today's digital world, online financial transactions have significantly improved people's lives. They are easier and more secure compared to physical transactions. But with the increasing number of online transactions every day, the security aspect of these transactions cannot be overlooked. They should be highly secure so that people can trust that both their money and data is safe.
More DetailsTech Center -
Learning Center
Cloud Security Best Practices
February 8, 2024Explore essential cloud security best practices, including encryption, access control, and recovery planning, to safeguard digital assets.
More DetailsTech Center -
Learning Center
Cybersecurity For The Internet of Things (IoT)
February 8, 2024Let's discuss IoT device security, exploring challenges, real-world scenarios, and future trends to safeguard our connected world.
More DetailsTech Center -
Learning Center
How Can I Create a Strong Password? Best Practices for Staying Safe Online
February 8, 2024Creating a strong password is of utmost importance to prevent attackers from gaining unauthorized access to online accounts, which could potentially result in reputational or financial loss.
More DetailsTech Center -
Blog
Scorecarder Spotlight: Priya Thupili
February 8, 2024Our series “Scorecarder Spotlight” showcases our talented employees and the incredible work they do. Meet Priya Thupili!
More Details -
Research
United Arab Emirates Cybersecurity: Supply Chain Threat Report
February 7, 2024This research presents an analysis of the cybersecurity landscape of the top 30 companies in the United Arab Emirates (UAE) by revenue. Companies were ranked based on various factors, such as: network security, potential malware infections, and patching cadence.
More DetailsSupply Chain Cyber Risk -
Learning Center
DDoS Attacks: What You Need To Know
February 6, 2024Uncover essential insights into DDoS attacks, their types, and effective prevention strategies to safeguard your digital domain effectively.
More DetailsTech Center