Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Data Sheet
Achieve DORA Compliance with SecurityScorecard
July 25, 2023SecurityScorecard offers a comprehensive solution for adhering to all major aspects of DORA, enabling your organization to minimize ICT risk exposures, build a resilient digital supply chain, and avoid non-compliance penalties.
More DetailsDORA, Security Ratings, Supply Chain Cyber Risk -
Webinar
Storms on the Horizon: Protecting Loss Ratios from the Expected and Unexpected
July 24, 2023More DetailsCyber Insurance -
Case Study
Horiens Reduces Supply Chain Risk with SecurityScorecard
July 19, 2023Using SecurityScorecard has given Horiens a tremendous competitive advantage as a risk management and insurance partner by providing relevant and actionable cybersecurity insights. With supply chain resilience as one of its main focus areas, Horiens has used SecurityScorecard’s tools to demonstrate its commitment to cybersecurity, improving its relationships and reliability.
More Details -
Research
A Technical Analysis Of The Quasar Forked Rat Called Void Rat
July 17, 2023VoidRAT is based on the open-source RAT called Quasar. The malware steals information from web browsers and applications such as FileZilla and WinSCP. It also implements a keylogger functionality that saves and exfiltrates the pressed keys.
More Details -
Case Study
Avangrid
July 13, 2023There's a trust factor between my organization and Scorecard.
More Details -
Blog, Learning Center
What is Cyber Threat Hunting?
July 12, 2023Threat hunting is a strategy used to find threats before they can cause damage. Learn more about cyber threat hunting and how to incorporate it into your organization.
More DetailsCyber Threat Intelligence, Tech Center -
Learning Center
What is Threat Intelligence in Cybersecurity? A Comprehensive Overview
July 6, 2023Threat intelligence helps you understand, prevent, and mitigate cyber threats. Learn how threat intelligence can benefit your business.
More DetailsTech Center -
Case Study
RSUI
June 23, 2023Security ratings are critical to me as an underwriter because cyber landscape is continuously evolving
More DetailsCyber Insurance -
Blog, Learning Center
Fortinet Fortigate Vulnerability CVE-2023-27997: How to Surface Exposed Devices and Mitigate the Threat
June 23, 2023Recently, a critical vulnerability tracked as CVE-2023-27997 was identified in Fortinet Fortigate appliances. This vulnerability has been exploited by the Chinese APT group Volt Typhoon, among others, targeting governments and organizations worldwide. As a result, Fortinet has released an urgent patch for affected systems. For a more detailed understanding of this vulnerability and the corresponding patch, you can read this Fortinet blog post.
More DetailsCyber Threat Intelligence