
Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Ebook
Securing the Supply Chain: Building Cyber Resilience in the Modern Era
In this guide, we’ll walk you through the process of building out your organization’s supply chain incident response capabilities with SCDR to enhance its supply chain cyber resilience.
More DetailsSCDR, Supply Chain Cyber Risk, Third-Party Risk Management -
Blog, Learning Center
Choosing Your Code Repository: Navigating the Security Landscape of Bitbucket vs GitHub
May 26, 2025Which code repository is more secure for enterprises—GitHub or Bitbucket? Compare their security features, risks, and third-party controls in 2025 to choose the right platform.
More DetailsTech Center -
Learning Center
CIFS vs. SMB: What’s the Difference and Which Is More Secure?
May 23, 2025CIFS and SMB both support file sharing across networks, but only one aligns with modern security standards. Learn the key differences and how to secure them.
More DetailsCybersecurity -
Learning Center
How to Use the National Institute of Standards and Technology (NIST) Cybersecurity Framework to Assess Vendor Security
May 22, 2025Learn how to use the NIST Framework to streamline vendor security assessments.
More DetailsNegin Aminian
Tech Center -
Learning Center
Best Practices for Trusted Third-Party Risk Management
May 22, 2025Check out these best practices to managing third-party risk for your organization. Learn more.
More DetailsSupply Chain Cyber Risk, Tech Center -
Learning Center
Security Questionnaires: Assessing and Managing Vendor Risks
May 22, 2025Security questionnaires are essential for assessing third-party vendor risk. Learn how to optimize their use in 2025 and improve your supply chain cybersecurity posture.
More DetailsSupply Chain Cyber Risk, Tech Center -
Research
Defending The Financial Supply Chain
2025 Report: Strengths and Vulnerabilities in Top Fintech Companies
More Details -
Press
SecurityScorecard Report Links 41.8% of Breaches Impacting Leading Fintech Companies to Third-Party Vendors
May 21, 2025Report reveals growing exposure in the financial supply chain as even top-rated fintech firms face systemic third- and fourth-party cyber risks
More Details -
Learning Center, Resources
Calculate MAX ROI
May 21, 2025Use our MAX ROI calculator to evaluate the financial benefits of SecurityScorecard MAX and build a strategy that fits your organization’s needs.
More DetailsMAX -
Learning Center
What Is the Oregon Consumer Privacy Act (OCPA)? What Businesses Need to Know
May 21, 2025Learn what the Oregon Consumer Privacy Act (OCPA) means for your organization, how it compares to other privacy laws, and what steps you must take to stay compliant and secure in 2025.
More DetailsCompliance -
Learning Center
What Is the NIST 800-53 Framework?
May 21, 2025Learn what the NIST 800-53 framework is, how it supports cybersecurity compliance, and how government contractors and organizations use it to assess risk, secure systems, and manage third-party threats.
More DetailsCybersecurity -
Learning Center
10 Best Practices for Securing Protected Health Information (PHI): What Is PHI and How To Secure It
May 20, 2025Learn what constitutes PHI, why it’s a top cyber target, and the most effective methods to secure medical data in compliance with HIPAA and beyond.
More DetailsHealthcare