Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Blog, Learning CenterWhat is Cyber Threat Hunting?
September 12, 2025Master cyber threat hunting with expert techniques and tools to find hidden threats before they cause data breaches.
More DetailsSteve Cobb
Cyber Threat Intelligence, Tech Center -
Learning CenterZero‑Day Attack Prevention: How to Prepare
September 12, 2025Learn how to prevent zero‑day attacks with hardening, detection prep, virtual patching, and a 24–72 hour response checklist, even before a patch exists.
More DetailsSteve Cobb
Tech Center -
Learning CenterWhat is Ransomware?
September 12, 2025Learn what ransomware is, how it works, types, and protection strategies. Comprehensive guide to ransomware prevention and recovery for businesses.
More DetailsSteve Cobb
Tech Center -
Blog, Learning CenterWhat is SOC 2 Compliance? A Complete Guide for Security Leaders
September 12, 2025What is SOC 2 compliance? This guide explains the audit, the five trust services, and how to get a SOC 2 report for your service organization.
More DetailsSteve Cobb
Tech Center -
Blog, Learning CenterWhat is Data Exfiltration and How to Prevent It
September 12, 2025Discover what data exfiltration is, the methods attackers use, and the best solutions to prevent data loss, protect devices, and enhance data security.
More DetailsSteve Cobb
Tech Center -
Blog, Learning CenterWhat is HIPAA Compliance? A Complete Guide
September 12, 2025What is HIPAA compliance? Learn essential requirements, common violations, and best practices for healthcare data protection and security.
More DetailsSteve Cobb
Tech Center -
Blog, Learning CenterWhat is a Cybersecurity Posture and How Can You Evaluate It?
September 12, 2025Organizations across industries struggle to maintain robust security postures. While tremendous strides have been made in security technology, the fundamentals of establishing and maintaining a strong cybersecurity posture remain elusive for many organizations.
More DetailsSteve Cobb
Tech Center -
Blog, Learning Center, STRIKEWhen SaaS Trust Becomes a Threat: Insights from the Salesloft Drift Compromise
September 10, 2025The STRIKE team has been analyzing the Salesloft Drift breach that spread into Salesforce environments. Discover what the breach tells us about supply chain security, how attackers abused OAuth tokens, what data is exposed, and defensive actions to take next.
More DetailsRyan Sherstobitoff
STRIKE Team -
BlogNow You Can See European Union Vulnerability Database (EUVD) IDs in the SecurityScorecard Platform
September 8, 2025Third-party risk management is complex as teams often struggle to track vulnerabilities across different data sources and standards. This can be especially challenging when working with vendors in the European Union, who may rely on a different set of databases with naming standards that don’t always align with U.S. standards.
More Details -
Case Study, ResourcesMAX for Medical Technology Provider
August 26, 2025Healthcare solutions company reduces vendor assessment time by 96%.
More DetailsMAX -
Case Study, ResourcesMAX for Supply Chain Solutions Provider
August 26, 2025Industrial equipment manufacturer gained real-time visibility into supplier cybersecurity posture.
More DetailsMAX -
Case Study, ResourcesMAX in the Industrial Sector
August 26, 2025Semiconductor manufacturer responds to time-sensitive vendor security issue.
More DetailsMAX