Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Learning Center
Analyzing FERPA Violation Examples to Strengthen Data Privacy in Education
March 4, 2024The Family Educational Rights and Privacy Act (FERPA) is a crucial piece of legislation designed to safeguard students' educational records. Despite its importance, FERPA violations still occur, highlighting the need for continuous vigilance and proactive measures to strengthen data privacy in education.
More DetailsTech Center -
Blog, Learning Center
Proactive Strategies to Prevent Ransomware Attacks
March 4, 2024Essential strategies to protect your organization from ransomware attacks, including defense mechanisms, regular updates, & employee training.
More DetailsAttack Surface Management, Tech Center -
Blog
SecurityScorecard 2024 Global Third-Party Cybersecurity Breach Report: Software supply chain is top target for ransomware groups
February 28, 2024The SecurityScorecard Global Third-Party Breach Report uses the world's largest proprietary risk and threat dataset to provide unique insights into the intricate web of supply chain vulnerabilities exploited by ransomware groups.
More DetailsPaul Prudhomme, STRIKE Threat Intelligence Analyst
Cyber Threat Intelligence, Supply Chain Cyber Risk -
Press
SecurityScorecard Third-Party Breach Report Reveals Software Supply Chain as Top Target for Ransomware Groups
February 28, 2024SecurityScorecard today released its Global Third-Party Cybersecurity Breach Report. Using the world’s largest proprietary risk and threat data set, SecurityScorecard STRIKE threat hunters analyzed threat groups' mass exploitation of supply chain vulnerabilities.
More Details -
Research
Global Third-Party Cybersecurity Breach Report
February 28, 2024In-depth analysis of the most significant third-party cyber risks and incidents in 2023
More DetailsServices, Supply Chain Cyber Risk -
Webinar
Supply Chain Guardians: Strategies for Resilient Ecosystems
February 28, 2024More DetailsSecurity Ratings, Supply Chain Cyber Risk -
Learning Center
Enhancing Your Cyber Defense: A Comprehensive Comparison of IDS vs IPS Technologies
February 23, 2024Businesses and individuals alike must employ robust security measures to protect their sensitive data and networks. Two key technologies in the realm of cybersecurity are Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). While both are crucial components of a comprehensive security strategy, understanding their differences is key for effective implementation and a robust cybersecurity posture. Here, we'll delve into the intricacies of IDS and IPS technologies, comparing their features, functionalities, and applications.
More DetailsTech Center -
Learning Center
Integrating Defender for Identity Into Your Security Strategy: A Step-by-Step Guide
February 23, 2024In this step-by-step guide, we'll walk you through the process of incorporating Defender for Identity into your cybersecurity program, empowering you to enhance your organization's security posture and defend against unauthorized access.
More DetailsTech Center -
Blog, Learning Center
Top 10 Cybersecurity Questions to Ask Your Vendors: A step-by-step guide to reduce supply chain risk
February 22, 2024Ask these ten key questions to make sure your organization’s vendor questionnaire doesn't become just a “check-the-box” exercise.
More DetailsSupply Chain Cyber Risk, Tech Center -
Blog
Beating LockBit at its Own Game: Law enforcement’s takedown of a prolific ransomware group
February 22, 2024After a years-long investigation, this week the FBI and law enforcement agencies in the UK and Europe took over the main website of the cybercrime group known as LockBit
More DetailsRob Ames, Senior Staff Threat Researcher; James Niven, Senior Staff Threat Researcher
Cyber Threat Intelligence -
Blog
3 2 1… Impact! Early Results under the SEC’s Cybersecurity Governance Rule
February 22, 2024The early results under the SEC's cybersecurity governance rule are in: companies need better preparedness and processes for compliance.
More DetailsOwen Denby, General Counsel, SecurityScorecard & Justin Daniels, Shareholder, Baker Donelson
Public Sector, Services -
Webinar
The Founders’ Take: Strategies for Cyber Resilience Despite Insecurity
February 22, 2024More DetailsExecutive Viewpoint