Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Research
Cyentia Institute and SecurityScorecard Research Report: Close Encounters of the Third (and Fourth) Party Kind
February 1, 2023More Details -
Blog
Close Encounters of the Third- (and Fourth-) Party Kind: The Blog
February 1, 2023Let’s dive deeper into some other insights that help us understand the true extent of exposure from third- and fourth-party relationships.
More DetailsSupply Chain Cyber Risk -
Press
SecurityScorecard Research Shows 98% of Organizations Globally Have Relationships With At Least One Breached Third-Party
February 1, 2023In collaboration with The Cyentia Institute, SecurityScorecard research finds 98% of organizations have vendor relationships with at least one third-party that has experienced a breach in the last two years.
More Details -
Learning Center
Enterprise Cybersecurity: What it is & Why it’s Important
January 20, 2023More DetailsTech Center -
Webinar
Being Proactive with Security: Deep Dive into Tabletop Exercises
January 18, 2023More Details -
Press
SecurityScorecard Research Finds 48% of Global Critical Manufacturing At Significant Risk of Breach
January 18, 2023SecurityScorecard research finds 48% of global critical manufacturing is at a significant risk of breach; addressing trust deficit is key.
More DetailsCyber Threat Intelligence -
Ebook
Addressing the Trust Deficit in Critical Infrastructure
January 13, 2023Despite a decade or more of increased focus on cybersecurity in boardrooms, legislatures, and the media, cyber resilience is getting worse, not better. Increasing cyberattacks and highly publicized breaches have undermined the public’s trust in the resilience of our societies, prompting business leaders and lawmakers worldwide to seek solutions for a mounting trust deficit.
More Details -
Research
Cyber Risk Intelligence: LockBit 3.0 Ransomware Group Claims Defense Contractor Breach
January 12, 2023More DetailsDr. Robert Ames, Staff Threat Researcher
Attack Surface Management, Cyber Insurance, Cyber Threat Intelligence, Supply Chain Cyber Risk -
Research
How to Analyze JavaScript Malware – A Case Study of Vjw0rm
January 10, 2023Vjw0rm is a worm that spreads via USB drives and has RAT capabilities because it implements different commands transmitted by the C2 server. It establishes persistence on a machine by copying to the Startup folder and creating a Run registry entry. The malware drops a Java-based RAT called STRRAT, executed using the Java executable that can be found on the local computer or downloaded from a remote URL.
More DetailsVlad Pasca