
Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Blog, Learning Center
What is the Cost of Cyber Liability Insurance?
September 20, 2023The cost of cyber liability insurance can vary based on factors such as business size, industry, risk profile, and coverage needs.
More DetailsCyber Insurance, Tech Center -
Webinar
Customer Insights Webinar: Level Up Your Threat Intelligence Program
September 14, 2023More Details -
Webinar
Navigating the Road to SEC Cyber Incident Disclosure Compliance
September 13, 2023More Details -
Press
SecurityScorecard Joins Forces with Measured Analytics and Insurance to Deliver Industry-First Cyber Insurance Discounts for Top Security Ratings
September 13, 2023SecurityScorecard partners with Measured Analytics and Insurance to deliver the first cyber insurance premium incentive for Security Ratings.
More DetailsCyber Insurance -
Blog
Using a Standardized Approach for Measuring Cybersecurity in Government
September 12, 2023One of the highlights of last week's annual Billington CyberSecurity Summit was a fireside chat on Friday with Anne Neuberger, deputy national security adviser for cyber and emerging technology. In her talk, Neuberger stressed the importance of not only keeping our critical infrastructure secure but harnessing an accurate and repeatable way of measuring it to ensure progress.
More DetailsPublic Sector -
Ebook
5 Steps You Can Take To Boost Your Boards Involvement And Stay Compliant
September 11, 2023PoshC2 is an open-source C2 framework used by penetration testers and threat actors. It can generate a Powershell-based implant, a C#.NET implant that we analyze in this paper, and a Python3 implant. The malware retrieves the current Windows user, the network domain name associated with the current user, the computer name, the processor architecture, the current process name and id, and the path of the Windows directory. The network communication is encrypted using the AES algorithm with a hard-coded key that can be changed by the C2 server. The C# implant can load and execute modules in memory without touching the disk by using multiple commands. It can perform post-exploitation activities by loading tools such as SharpHound, Rubeus, SharpView, and Seatbelt.
More DetailsVlad Pasca
-
Data Sheet
Top 10 Security Questions Asked By Board Members
September 8, 2023What are the top questions board members ask of their organizations security? We've compiled 10 common questions with strategies to address their concerns.
More DetailsExecutive Viewpoint -
Webinar
Customer Insights Webinar: Take More Control of Your Score with Custom Scorecard
September 7, 2023More Details -
Ebook
DORA: A Journey To Cyber Resilience
September 6, 2023In January 2023, a pivotal regulation took center stage for the European Union (EU) financial services sector. The Digital Operational Resilience Act (DORA) emerged as a requirement, ushering in a new era of cybersecurity.
More DetailsDORA