
Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Learning Center
What Is PII? How to Protect Personally Identifiable Information in 2025
May 8, 2025Personally identifiable information (PII) remains a prime target for threat actors. Learn what qualifies as PII in 2025—and how to defend it.
More Details -
Learning Center
What Is a Cyber Threat? What Risk Leaders Need to Know
May 7, 2025Learn what cyber threats are, how they work, and why recognizing them is essential to reducing organizational risk.
More Details -
Blog, Learning Center
What Is Port 445 (SMB)? Strategies for Secure Network Communication
May 6, 2025Port 445 enables SMB traffic but is a prime target for ransomware and wormable exploits. Learn what it is, why it’s risky, and how to secure it.
More DetailsTech Center -
Blog
Assembling the Dream Team: Building a High-Performing Supply Chain Incident Response Team
May 6, 2025This article explores the key elements of building a high-performing supply chain incident response team to effectively mitigate and respond to these threats.
More DetailsSCDR -
Blog
Scorecarder Spotlight: Chandra Sekhar Betha
May 5, 2025Our “Scorecarder Learning & Development Spotlight” series showcases our talented, driven employees, the incredible work they do, and their quest to continue their development as lifelong learners.
More DetailsScorecarder Spotlight -
Ebook
The Definitive Guide to Building a Supply Chain Incident Response Team
This eBook provides a step-by-step guide to building a dedicated supply chain incident response team capable of effectively mitigating and responding to evolving supply chain cybersecurity threats.
More DetailsSCDR, Supply Chain Cyber Risk, Third-Party Risk Management -
Learning Center
How Do You Back Up Business-Critical Data?
May 2, 2025Building a Reliable Backup Strategy Against Cyberattacks and Disruptions Using Best Practices for Cyber Resilience
More DetailsEnterprise Cyber Risk, MAX, Third-Party Risk Management -
Learning Center
What Do You Do If Your Password Appears in a Data Leak?
May 1, 20257 Steps to Secure Your Digital Life After a Password Breach
More DetailsEnterprise Cyber Risk, GRC, Phishing, SCDR, Third-Party Risk Management -
Learning Center
What Is a Proxy Server? Understanding Security Risks and Corporate Use Cases
April 30, 2025How Proxy Servers Work and Why They Matter in Enterprise Security
More DetailsSCDR, Third-Party Risk Management -
Press
BlinkOps and SecurityScorecard Announce Technical Alliance to Revolutionize Cybersecurity Automation and Risk Management
April 29, 2025More Details -
Learning Center
Fines, Jail Time, and Criminal Charges for DDoS Attacks
April 29, 2025Fines, Are DDoS Attacks Illegal? Find out the laws and penalties in this blog.
More DetailsSecurity Ratings, Supply Chain Cyber Risk, Third-Party Risk Management -
Press
SecurityScorecard MAX Achieves Explosive 370% YoY Growth, Launches MAX Workstation to Enable Partner-Led Service Delivery
April 28, 2025More DetailsMAX