
Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Learning Center
What is the Difference Between Information Security vs Cybersecurity?
February 13, 2025Information security and cybersecurity are often used interchangeably; however, they both address different kinds of security. Learn more.
More DetailsTech Center -
Learning Center
What is IT Risk Management? A Complete Guide
February 13, 2025More DetailsTech Center -
Blog, Learning Center
The Ultimate Data Breach Response Plan
February 13, 2025In a hyper-connected world, data breaches continue to increase in size and scope. To bolster your cybersecurity posture, you should put together a data breach response plan as a way to prepare your organization.
More DetailsServices, Tech Center -
Learning Center
What’s Wrong with Two-Factor Authentication?
February 13, 2025Though requiring an extra identifier does deter some hackers from attacking systems defended with two-factor authentication, it is not always your safest option. Find out more on SecurityScorecard's blog.
More DetailsTech Center -
Learning Center
How Can You Secure Risky Open Ports?
February 13, 2025Open network ports enable organizations to adopt cloud strategies. However, each port is technically a small gateway into an organization’s IT stack. Learn how you can security risky open ports.
More DetailsTech Center -
Learning Center
The Role of Cybersecurity in Enterprise Risk Management (ERM)
February 13, 2025An enterprise risk management program should include a cybersecurity element so organizations can identify relationships between risk and impact across its ecosystem.
More DetailsTech Center -
Blog, Learning Center
Vendor Risk Assessment Template
February 13, 2025You can’t completely eliminate vendor risk, but you can manage it. Learn how to create a vendor risk assessment template with SecurityScorecard.
More DetailsTech Center -
Research
Lazarus Group is Infecting Open-Source Code. Are You at Risk?
February 13, 2025North Korea’s Lazarus Group is hiding malware inside GitHub repositories and NPM packages, compromising developers and cryptocurrency platforms. Their targets: your code, your wallets, your users.
More DetailsSTRIKE Team -
Blog
Lazarus Group Targets Developers Through NPM Packages and Supply Chain Attacks
February 13, 2025North Korea’s Lazarus Group is evolving its tactics again. The latest campaign, dubbed Operation Marstech Mayhem, introduces an advanced implant named "Marstech1."
More DetailsSTRIKE Team -
Webinar
Breaking Silos with SCDR: How SOCs & TPRM Teams Drive Integrated Cyber Strategies
February 11, 2025More DetailsSCDR