Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Research
CISO Playbook: Third-Party Cyber Incident Response
March 13, 2024Learn how to streamline your response efforts, communicate effectively during crises, and transform insights from past incidents into fortified defenses for your digital ecosystem.
More DetailsServices, Supply Chain Cyber Risk -
Blog
Infosys McCamish Systems Third-Party Breach: Possible Attack Vectors and Infrastructure
March 12, 2024In response to the identification of Infosys McCamish Systems (IMS) as the point of origin for a third-party data breach claimed by the LockBit ransomware group, SecurityScorecard researchers reviewed findings on the security hygiene of IMS.
More DetailsRob Ames and Paul Prudhomme, Threat Research and Intelligence, SecurityScorecard
Cyber Threat Intelligence -
Blog
Forrester Includes SecurityScorecard in Cybersecurity Risk Ratings (CRR) Landscape Report
March 12, 2024To help sift through the ever-growing field of cybersecurity ratings, Forrester recently published The Cybersecurity Risk Ratings Platforms Landscape, Q1 2024. SecurityScorecard is proud to be included in this landscape, in the company of other notable vendors in the field. Once a misunderstood technology, Cybersecurity Risk Ratings platforms (CRRs) have earned their place in the spotlight in the last several years.
More DetailsBennett Morrison, Vice President of Product & Strategy
Security Ratings -
Webinar
Breaches Beyond Borders: A Deep Dive Into Third-Party Cybersecurity Breaches
March 12, 2024More DetailsSupply Chain Cyber Risk -
Blog, Learning Center
Defender for Endpoint: Transforming Endpoint Security with Advanced Threat Protection
March 8, 2024Explore how Microsoft's Sentinel transforms cybersecurity with AI, offering advanced threat detection and automated responses.
More DetailsTech Center -
Learning Center
What is Domain Hijacking and How Do I Prevent it?
March 7, 2024Your domain name is not just a web address; it represents your brand, your reputation, and often, your livelihood. However, with the increasing value of domain names, they have become targets for cybercriminals seeking to exploit vulnerabilities for their gain. One such threat is domain hijacking – a serious issue that can have significant repercussions if not addressed promptly. Here, we'll delve into what domain hijacking entails and explore practical steps to prevent it from happening to you.
More DetailsTech Center -
Webinar
Red Sift Rising: Tools to Level Up Your Cybersecurity Rating
March 7, 2024More DetailsSecurity Ratings -
Blog, Learning Center
What is Sentinel? Harnessing the Power of Cloud-Native SIEM for Modern Cybersecurity Challenges
March 6, 2024Explore how Microsoft's Sentinel SIEM solution transforms cybersecurity with AI, offering advanced threat detection and automated responses.
More DetailsTech Center -
Blog
New Malware Attributed to Russian Hacking Group APT28
March 6, 2024Late last year, the Computer Emergency Response Team of Ukraine (CERT-UA) released an advisory that reported cyberattacks targeting Ukrainian state organizations attributed to the Kremlin-backed nation-state group APT28, aka Fancy Bear/Sofacy. The advisory listed the use of a new backdoor named “OCEANMAP,” detailed in this whitepaper.
More DetailsCyber Threat Intelligence -
Webinar
The Future of Supply Chain Cybersecurity: Navigating the Evolving Landscape
March 5, 2024More DetailsExecutive Viewpoint, Supply Chain Cyber Risk -
Research, White Paper
A technical analysis of the APT28’s backdoor called OCEANMAP
March 5, 2024Late last year, the Computer Emergency Response Team of Ukraine (CERT-UA) released an advisory that reported cyberattacks targeting state organizations attributed to the Russian espionage group APT28, aka Fancy Bear/Sofacy. The advisory listed the use of a new backdoor named “OCEANMAP.” Download this whitepaper to explore a technical analysis of APT28’s tactics, techniques, and procedures.
More DetailsVlad Pasca
Cyber Threat Intelligence, Enterprise Cyber Risk, Supply Chain Cyber Risk -
Learning Center
Leveraging SIEM Splunk for Enhanced Cybersecurity: A Comprehensive Guide
March 4, 2024In this comprehensive guide, we'll delve into the world of SIEM Splunk and explore how organizations can leverage it to enhance their cybersecurity posture.
More DetailsTech Center