Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Learning Center
What is a Cybersecurity Assessment?
November 7, 2024A cybersecurity assessment helps security teams determine whether or not an organization is properly prepared to protect its assets against a range of threats. Learn more.
More DetailsTech Center -
Learning Center
What is Cybersecurity Risk? Definition & Factors to Consider in 2024
November 7, 2024More DetailsTech Center -
Learning Center
Inherent Risk vs. Residual Risk: What’s the Difference?
November 7, 2024More DetailsTech Center -
Learning Center
22 Cybersecurity Metrics & KPIs to Track in 2024
November 7, 2024More DetailsSecurity Ratings, Tech Center -
Blog, Learning Center
What is the CIA Triad? Definition, Importance, & Examples
November 7, 2024More DetailsPrivate: Phoebe Fasulo
Tech Center -
Blog, Learning Center
Navigating the Risks of TCP 445: Strategies for Secure Network Communication
November 7, 2024Discover how to secure TCP 445 against cyber threats with our essential strategies for robust network communication and safety.
More DetailsTech Center -
Blog, Learning Center
Securing Port 139: Strategies to Prevent Unauthorized Access and Cyber Threats
November 7, 2024Discover how to secure Port 139 against cyber threats with SMB protocol security, preventing unauthorized access and ensuring network safety.
More DetailsTech Center -
Blog
Inside a North Korean Phishing Operation Targeting DevOps Employees
October 29, 2024Uncover how SecurityScorecard thwarted a sophisticated phishing attack targeting our DevOps team. This blog details a North Korean state actor's attempt to deploy a malicious backdoor through a fake job offer on social media. Learn about the evolving tactics of threat actors and how our swift response blocked potential damage. Stay informed and strengthen your defenses against these persistent cyber threats.
More DetailsRyan Sherstobitoff, SVP Threat Research & Intelligence
Nation State Actors, Phishing, STRIKE Team -
Blog
The Job Offer That Wasn’t: How We Stopped an Espionage Plot
October 29, 2024Discover how SecurityScorecard thwarted a sophisticated cyber-espionage plot disguised as a job offer. Learn about the 'Contagious Interview' campaign, the tactics used by the Famous Chollima group, and essential strategies to protect your organization from targeted attacks. Don't let your next career move become a trap—stay informed and secure!
More DetailsSteve Cobb, CISO, SecurityScorecard
STRIKE Team -
Research
Third-Party Breaches Are the Top Threat for the U.S. Energy Sector
October 23, 2024This comprehensive report provides a deep dive into the cybersecurity posture of the U.S. energy sector. We've analyzed 250 top energy companies using SecurityScorecard metrics to identify vulnerabilities and potential threats.
More DetailsSupply Chain Cyber Risk, Third-Party Risk Management -
Press
67% of Energy Sector Breaches Linked to Software and IT Vendors, SecurityScorecard Reports
October 23, 2024Energy sector faces surge in supply chain risks amid growing dependence on vendors.
More DetailsSupply Chain Cyber Risk, Third-Party Risk Management