Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Webinar
Insights from the front lines: How to evaluate a partner you can trust [#1]
October 10, 2023More Details -
Research
Attack Surface Intelligence Identifies Additional Cuba Ransomware-Linked Indicators of Compromise
September 28, 2023More Details -
Case Study
Private Equity Firm
September 21, 2023Private Equity Firm focused on the partner aspect of cybersecurity services.
More Details -
Blog, Learning Center
What is the Cost of Cyber Liability Insurance?
September 20, 2023The cost of cyber liability insurance can vary based on factors such as business size, industry, risk profile, and coverage needs.
More DetailsCyber Insurance, Tech Center -
Webinar
Customer Insights Webinar: Level Up Your Threat Intelligence Program
September 14, 2023More Details -
Webinar
Navigating the Road to SEC Cyber Incident Disclosure Compliance
September 13, 2023More Details -
Press
SecurityScorecard Joins Forces with Measured Analytics and Insurance to Deliver Industry-First Cyber Insurance Discounts for Top Security Ratings
September 13, 2023SecurityScorecard partners with Measured Analytics and Insurance to deliver the first cyber insurance premium incentive for Security Ratings.
More DetailsCyber Insurance -
Blog
Using a Standardized Approach for Measuring Cybersecurity in Government
September 12, 2023One of the highlights of last week's annual Billington CyberSecurity Summit was a fireside chat on Friday with Anne Neuberger, deputy national security adviser for cyber and emerging technology. In her talk, Neuberger stressed the importance of not only keeping our critical infrastructure secure but harnessing an accurate and repeatable way of measuring it to ensure progress.
More DetailsPublic Sector -
Ebook
5 Steps You Can Take To Boost Your Boards Involvement And Stay Compliant
September 11, 2023PoshC2 is an open-source C2 framework used by penetration testers and threat actors. It can generate a Powershell-based implant, a C#.NET implant that we analyze in this paper, and a Python3 implant. The malware retrieves the current Windows user, the network domain name associated with the current user, the computer name, the processor architecture, the current process name and id, and the path of the Windows directory. The network communication is encrypted using the AES algorithm with a hard-coded key that can be changed by the C2 server. The C# implant can load and execute modules in memory without touching the disk by using multiple commands. It can perform post-exploitation activities by loading tools such as SharpHound, Rubeus, SharpView, and Seatbelt.
More DetailsVlad Pasca