
Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Learning Center
Integrating Defender for Identity Into Your Security Strategy: A Step-by-Step Guide
February 23, 2024In this step-by-step guide, we'll walk you through the process of incorporating Defender for Identity into your cybersecurity program, empowering you to enhance your organization's security posture and defend against unauthorized access.
More DetailsTech Center -
Blog, Learning Center
Top 10 Cybersecurity Questions to Ask Your Vendors: A step-by-step guide to reduce supply chain risk
February 22, 2024Ask these ten key questions to make sure your organization’s vendor questionnaire doesn't become just a “check-the-box” exercise.
More DetailsSupply Chain Cyber Risk, Tech Center -
Blog
Beating LockBit at its Own Game: Law enforcement’s takedown of a prolific ransomware group
February 22, 2024After a years-long investigation, this week the FBI and law enforcement agencies in the UK and Europe took over the main website of the cybercrime group known as LockBit
More DetailsRob Ames, Senior Staff Threat Researcher; James Niven, Senior Staff Threat Researcher
Cyber Threat Intelligence -
Blog
3 2 1… Impact! Early Results under the SEC’s Cybersecurity Governance Rule
February 22, 2024The early results under the SEC's cybersecurity governance rule are in: companies need better preparedness and processes for compliance.
More DetailsOwen Denby, General Counsel, SecurityScorecard & Justin Daniels, Shareholder, Baker Donelson
Public Sector, Services -
Webinar
The Founders’ Take: Strategies for Cyber Resilience Despite Insecurity
February 22, 2024More DetailsExecutive Viewpoint -
Blog
Chinese Hacking Group Targets US Critical Infrastructure
February 20, 2024The FBI and CISA are warning that “Volt Typhoon” has been lurking in US critical infrastructure systems for at least five years.
More DetailsCyber Threat Intelligence -
Learning Center
The Human Factor in Cybersecurity
February 16, 2024While technological advancements continue to fortify digital defenses, human behavior remains a pivotal element in determining the success or failure of cybersecurity measures.
More DetailsTech Center -
Learning Center
What Exactly is the Dark Web?
February 16, 2024At its core, the dark web is a part of the internet that is not indexed by traditional search engines like Google.
More DetailsTech Center -
Learning Center
How to Avoid Social Engineering Attacks
February 15, 2024In today's digital era, we rely heavily on the use of modern technology. There is no doubt that the use of modern technologies has made our lives a lot easier, but it has many downsides as well. These innovative technologies have made us more vulnerable to social engineering attacks than ever before.
More DetailsTech Center -
Press
SecurityScorecard Achieves StateRAMP®
February 15, 2024U.S. state and local government agencies to adopt ‘A to F’ letter grades to measure and improve cybersecurity resilience.
More DetailsPublic Sector -
Webinar
Take Supply Chain Cyber Risk Management to the MAX
February 15, 2024More DetailsServices, Supply Chain Cyber Risk -
Learning Center
What is the Zero Trust Security Model?
February 14, 2024Discover how the Zero Trust Security Model is redefining cybersecurity by emphasizing verification across identity, devices, and networks.
More DetailsTech Center