Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Webinar
Carve Through the Noise by Prioritizing the Most Critical Threats
December 19, 2022More Details -
Case Study
Liquidnet Case Study
December 12, 2022Liquidnet uses SecurityScorecard as a third-party management solution to quantify the security performance of their vendors, provide continuous monitoring and do both of those things without requiring an immense amount of manual time from Liquidnet's team.
More Details -
Infographic
CISO on the Shelf
December 8, 2022It's that time of year again! Be on the lookout for your organization's CISO. This helpful security professional will be watching over every security move you make... so be on your best behavior because they'll be reporting back to the CEO!
More Details -
Learning Center
Hackers Are Using These 3 Techniques to Bypass MFA
December 7, 2022Multi-factor authentication (MFA) is an essential security measure, but here are some frequently-used methods cyber-attackers leverage to bypass MFA.
More DetailsTech Center -
Press
SecurityScorecard Empowers Customers to Maximize their Security Investments by Providing a One-Stop Shop with Dramatically Expanded Partner Marketplace
December 6, 2022Discover how SecurityScorecard's Marketplace has expanded by 80%, enhancing cybersecurity visibility and integration for trusted partner solutions.
More Details -
Learning Center
9 Steps to Mitigate Ransomware Attacks for Your Business
November 30, 2022Ransomware attacks are a top concern for many businesses as the threat landscape expands. Follow these 9 steps to help mitigate the risk for your business.
More DetailsTech Center -
Learning Center
Mobile Device Forensics: Challenges, Threats, & Solutions
November 21, 2022Mobile device forensics can help you recover lost or deleted data, as well as investigate a potential mobile security breach. Learn more.
More DetailsTech Center -
Webinar
Confident Data gives you Actionable Insights in our Q4 ’22 Release
November 15, 2022More Details -
Research
A Technical Analysis Of The Royal Ransomware
November 14, 2022This malware encrypts files with the AES algorithm, either fully or partially. The extension of the affected files changes to “.royal”. Find out more in this technical analysis of the Royal Ransomware from SecurityScorecard’s Senior Malware Analyst, Vlad Pasca.
More DetailsVlad Pasca