
Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Blog, Learning Center, STRIKE
Unmasking A New China-Linked Covert ORB Network: Inside the LapDogs Campaign
June 23, 2025SecurityScorecard’s STRIKE team uncovered a new China-Nexus ORB Network targeting the United States and Southeast Asia. Read the report to gain an in-depth look at the LapDogs ORB network, its custom malware, and its role in cyberespionage.
More DetailsSTRIKE Team -
Learning Center
What Is FIPS 140-3 and Why Does It Matter for Security Compliance?
June 23, 2025Learn what FIPS 140-3 certification entails, why it’s critical for federal and industry cybersecurity compliance, and how to ensure your cryptographic modules meet the standard.
More Details -
Learning Center
What Does the Gramm-Leach-Bliley Act (GLBA) Require?
June 20, 2025Learn the core requirements of the Gramm-Leach-Bliley Act (GLBA), including the Safeguards Rule, privacy notices, and cybersecurity responsibilities for financial institutions.
More Details -
Learning Center
Sender Policy Framework (SPF): How It Stops Email Spoofing
June 20, 2025Learn how SPF works to prevent email spoofing, how to configure SPF records, and why it’s critical for securing your domain from phishing campaigns.
More Details -
Learning Center
What’s the Difference Between Authenticity and Non-Repudiation in Cybersecurity?
June 19, 2025Understand the difference between authenticity and non-repudiation in cybersecurity, and how both play key roles in identity verification, encryption, and data integrity.
More Details -
Learning Center
What Are Best Practices for Data Security for Sensitive Data?
June 19, 2025Learn best practices to secure sensitive data, including encryption, access control, and continuous monitoring. Discover how organizations reduce breach risks while staying compliant.
More Details -
Learning Center
What Are the Key Steps to Achieve PCI DSS 4.0 Compliance?
June 19, 2025Explore step-by-step guidance to comply with PCI DSS 4.0, including new 2025 requirements, technical controls, and vendor accountability measures.
More Details -
Learning Center
How to Build an OPSEC Culture in Your Organization
June 19, 2025Discover how to build an OPSEC (Operational Security) culture that protects sensitive information, counters social engineering, and reduces third-party risk exposure across your workforce.
More Details -
Webinar
Fortifying Your Supply Chain: The ROI of Managed Supply Chain Detection and Response
June 18, 2025Join us to discover how a managed Supply Chain Detection and Response (SCDR) service, like SecurityScorecard MAX, transforms your approach to vendor risk.
More DetailsMAX, SCDR -
Learning Center
Spear Phishing vs. Phishing: What’s the Difference?
June 18, 2025Understand the difference between phishing and spear phishing, how attackers use each tactic, and what organizations can do to prevent credential theft and business compromise.
More DetailsPhishing, SCDR -
Learning Center
What Is a Zero-Day Exploit and Why Is It So Dangerous?
June 18, 2025Learn what a zero-day exploit is, why it poses such a severe risk, and how organizations can detect and mitigate zero-day attacks using proactive threat intelligence.
More Details -
Learning Center
How SSL Certificates Work—and Why They Still Matter
June 18, 2025SSL certificates remain foundational to online trust and encryption. This blog explains how SSL/TLS certificates work, the risks of poor certificate management, and why organizations must maintain certificate hygiene in 2025.
More Details