![](https://securityscorecard.com/wp-content/uploads/2024/06/SSC_Updated_Resources-17-scaled.webp)
Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Press
SecurityScorecard Named to Fast Company’s Annual List of the World’s Most Innovative Companies for 2023
March 2, 2023SecurityScorecard joins the ranks of Disney, Tiffany & Co., and others.
More Details -
Data Sheet
Incident Response Tabletop Exercise
March 1, 2023SecurityScorecard’s Incident Response (IR) Tabletop Exercise tests your team’s cyber readiness against a real world cyber incident. Using a scenario-based methodology, teams can practice their skills and identify gaps in your incident response plan so you can strengthen and sharpen your response time and readiness.
More DetailsServices -
Research, White Paper
Expand Your Vendor Intelligence To Identify Active Threats
February 28, 2023Research by Ponemon Institute reports that 59% of survey respondents haveconfirmed that their organization has experienced a data breach caused byone of their third parties, with 54% of the incidents occurring in the past12 months. What is more alarming is that only 34% of organizations areconfident their suppliers would notify them of a breach that couldput their business at risk. As the global attack surface continuesto expand, it’s more important than ever to tighten and matureThird- Party Risk Management (TPRM) programs, alsoreferred to as Vendor Risk Management. Staying ahead ofweaponized vulnerabilities and threat actors targetingyour vendors’ assets decreases the chances of acyber disruption to your organization.
More DetailsAttack Surface Management, Cyber Threat Intelligence, Enterprise Cyber Risk, Security Ratings, Supply Chain Cyber Risk -
Press
SecurityScorecard Added to the Department of Homeland Security’s Continuous Diagnostics and Mitigation Program’s Approved Products List (CDM APL)
February 28, 2023SecurityScorecard’s Attack Surface Intelligence Solution is now available to federal agencies looking to enhance threat monitoring and detection.
More DetailsPublic Sector -
Webinar
Being Proactive with Security: Processes for a More Cyber Resilient Organization
February 23, 2023More Details -
Research
A Deep Dive Into A Posh C2 Implant
February 19, 2023PoshC2 is an open-source C2 framework used by penetration testers and threat actors. It can generate a Powershell-based implant, a C#.NET implant that we analyze in this paper, and a Python3 implant.
More Details -
Press
SecurityScorecard Announces Significant Momentum in 2022, Growing by 49%
February 15, 2023SecurityScorecard now delivers Security Ratings, Response, and Resilience Solutions and Services to 73% of Fortune 100 organizations.
More Details