Resources
Cybersecurity white papers, data sheets, webinars, videos and more
Resource Library
Webinars
DORA Compliance Unveiled: Managing Third-Party Risks
Learn more in this resource.
Webinars
Customer Insights Webinar: Level Up Your Threat Intelligence Program
Learn more in this resource.
Research
A Detailed Analysis of the Money Message Ransomware
Learn more in this resource.
Webinars
Navigating the Road to SEC Cyber Incident Disclosure Compliance
Learn more in this resource.
Press
SecurityScorecard Joins Forces with Measured Analytics and Insurance to Deliver Industry-First Cyber Insurance Discounts for Top Security Ratings
SecurityScorecard partners with Measured Analytics and Insurance to deliver the first cyber insurance premium incentive for Security Ratings.
Cyber Insurance
Press
SecurityScorecard Joins Forces with Measured Analytics and Insurance to Deliver Industry-First Cyber Insurance Discounts for Top Security Ratings
SecurityScorecard partners with Measured Analytics and Insurance to deliver the first cyber insurance premium incentive for Security Ratings.
Cyber Insurance
Blog
Using a Standardized Approach for Measuring Cybersecurity in Government
One of the highlights of last week’s annual Billington CyberSecurity Summit was a fireside chat on Friday with Anne Neuberger, deputy national security adviser for cyber and emerging technology. In her talk, Neuberger stressed the importance of not only keeping our critical infrastructure secure but harnessing an accurate and repeatable way of measuring it to ensure progress.
Public Sector
Ebook
5 Steps You Can Take To Boost Your Boards Involvement And Stay Compliant
PoshC2 is an open-source C2 framework used by penetration testers and threat actors. It can\r\ngenerate a Powershell-based implant, a C#.NET implant that we analyze in this paper, and a\r\nPython3 implant. The malware retrieves the current Windows user, the network domain name\r\nassociated with the current user, the computer name, the processor architecture, the current\r\nprocess name and id, and the path of the Windows directory. The network communication is\r\nencrypted using the AES algorithm with a hard-coded key that can be changed by the C2\r\nserver. The C# implant can load and execute modules in memory without touching the disk by\r\nusing multiple commands. It can perform post-exploitation activities by loading tools such as\r\nSharpHound, Rubeus, SharpView, and Seatbelt.
Blog
The Top 7 Cyberattacks on U.S. Government: A closer look at the evolving landscape of cybersecurity
Cyberattacks are an increasingly significant threat to governments worldwide. This blog post examines some of the top cyberattacks on US government.
Public Sector
Tech Center
Data Sheet
Top 10 Security Questions Asked By Board Members
What are the top questions board members ask of their organizations security? We’ve compiled 10 common questions with strategies to address their concerns.
Executive Viewpoint
Webinars
Customer Insights Webinar: Take More Control of Your Score with Custom Scorecard
Learn more in this resource.
Ebook
DORA: A Journey To Cyber Resilience
In January 2023, a pivotal regulation took center stage for the European Union (EU) financial services sector. The Digital Operational Resilience Act (DORA) emerged as a requirement, ushering in a new era of cybersecurity.
DORA
Webinars
Threat Talk Thursday E03
Learn more in this resource.
Data Sheet
Fast, Easy, Collaborative Refute Process
Adjust your ratings with a fast, easy, and collaborative refute process
Security Ratings
Data Sheet
Your cybersecurity journey begins with trust
The Trust Portal serves as a single source of truth when looking for answers to questions about the validity and accuracy of our ratings, scoring methodology and data collection processes, and how we comply with industry standards and regulations.
Security Ratings
Data Sheet
Discover what customers love about SecurityScorecard
Read how organizations use the SecurityScorecard platform to fit their specific needs, while improving visibility, and saving time and resources.
Security Ratings
Ebook
5 Tips To Know You Are Using Data You Can Trust
Organizations need to trust their data and be confident that their customers, clients, and vendors can trust it as well. This means knowing that it’s accurate, reliable, and secure. How can this be accomplished?
Ebook
4 Factors To Consider When Evaluating A Cybersecurity Partner
How should you evaluate a partner you work with? This guide can help you make informed choices about business partners.
Data Sheet
Zero-Day as-a-Service (ZDaaS)
Your Ultimate Defense Against Zero Days Zero-Day Vulnerability Identification: Our ROC analysts leverage SecurityScorecard signals and threat intelligence to identify active zero day exploits as they develop. Vendor Assessment for Potential Impact: Targeted vendors within your third and fourth-party ecosystem are assessed for potential impact to an announced zero day vulnerability/ critical CVE. Zero-Day Reports: Our comprehensive reports provide precise recommendations to counter identified zero day vulnerabilities/ critical CVEs and solidify your cybersecurity defenses. Detailed findings, outputs, and score improvement planning Zero-day vulnerabilities are unseen, undetectable risks, waiting to exploit gaps in your IT environment and supply chain ecosystem. Your team can do everything right and still be breached due to a zero day critical vulnerability.
Professional Services
Services
Webinars
Customer Insights Webinar: Learn More About Our APIs
Learn more in this resource.
Webinars
Customer Insights Webinar: Explore our Marketplace
Learn more in this resource.