Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Press
SecurityScorecard Enables Organizations to View Risks and Measure the ROI of Security Investments in the Midst of Turbulent Economic Times
September 19, 2022SecurityScorecard unveils resources to aid organizations in demonstrating the ROI of security investments amid economic uncertainty.
More Details -
Data Sheet
SecurityScorecard and Snowflake
September 14, 2022Combine, enrich, and contextualize SecurityScorecard vendor security data in Snowflake for an integrated view of third-party risk
More DetailsThird-Party Risk Management -
Research, White Paper
A Detailed Analysis Of The Quantum Ransomware
September 14, 2022More DetailsAttack Surface Management, Cyber Insurance, Cyber Threat Intelligence, Enterprise Cyber Risk, Security Ratings, Supply Chain Cyber Risk -
Webinar
The Fast & Frivolous: The Race for Vulnerability Remediation
September 13, 2022More DetailsAttack Surface Management -
Case Study
SecurityScorecard Helps Cyber Insurance Provider Make Smarter Risk Assessments During the Underwriting Process
September 12, 2022The provider’s global corporate and commercial group uses SecurityScorecard to evaluate the cyber risk of applicants in order to make a green light/red light decision about accepting them as customers.
More DetailsCyber Insurance -
Press
NTT DATA UK&I Teams with SecurityScorecard to Transform Cyber Risk Monitoring Across the UK and Ireland
September 12, 2022NTT DATA UK&I and SecurityScorecard announce a partnership to enhance cyber risk monitoring and security management across the UK and Ireland.
More Details -
Case Study
SecurityScorecard Helps Security Technology Consultant Take Control of Its Own Cyber Risk
September 6, 2022NVC uses SecurityScorecard to track its risks and ensure they are appropriately remediated, while also using Badges to give customers more peace of mind.
More Details -
Blog
TTPs Associated With a New Version of the BlackCat Ransomware
September 6, 2022In this post, we describe a real engagement that we recently handled by giving details about the tools, techniques, and procedures (TTPs) used by this threat actor.
More DetailsCyber Threat Intelligence -
Blog
Analysis of APT35 infrastructure reveals interest in Egyptian Shipping Companies
August 31, 2022More DetailsRyan Slaney and Robert Ames, Staff Threat Researchers and Alex Heid, Chief Research Officer
-
Webinar
Managing Cyber Complexities in Supply Chain Risk Management
August 24, 2022More DetailsSecurity Ratings, Supply Chain Cyber Risk