Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Learning Center
What is a Botnet Attack? 5 Ways to Prevent It
February 2, 2022A botnet attack happens when a group of devices is infected by malware that is under the control of a hacker. Explore ways to prevent botnet attacks from happening now.
More DetailsTech Center -
Research
The CISO’s Playbook: Stay Ahead of Friday Breach Effects
February 1, 2022SecurityScorecard examined four years of data breach reports to uncover discovery trends for every day of the week. Here’s your Friday Breach Effect Report.
More Details -
Learning Center
What is Third Party Due Diligence? What You Should Know
January 31, 2022Due diligence is the investigation that a person or business is expected to take on before entering into an agreement with a third-party. Learn more.
More DetailsTech Center -
Infographic
How Can Cyber Insurers Manage Their True Risk?
January 28, 2022Cyber insurance providers traditionally evaluate cyber risk the same way they evaluate homes, cars, medical costs or any other insurable entity. However, this point-in-time underwriting process leaves cyber insurance providers dangerously exposed if there’s a sudden, unexpected event that causes a spike in cyber incidents. Can you think of any sudden, unexpected events lately?
More Details -
Ebook
How Continuous Underwriting is Transforming Cyber Insurance
January 13, 2022In this ebook, we’ll help you understand how a continuous underwriting approach works, challenges to watch for, and why security ratings are an essential tool for enabling a continuous underwriting process.
More DetailsCyber Insurance -
Learning Center
How to Measure Risk Management Performance: KPI & Metrics
January 3, 2022More DetailsSecurity Ratings, Tech Center -
Research
Proactive Security Measures for Global Maritime Shipping
December 17, 2021New research from SecurityScorecard analyzed the cybersecurity health of 100 global shipping container companies and found that high severity cyber vulnerabilities pose a significant risk to U.S. maritime security and major supply chain risks. Read more in the report here, including what the industry can do to combat these issues.
More Details -
Research
Log4j Security Vulnerability
December 17, 2021Understanding the Origins, Implications, and What It Means for You. The SecurityScorecard Global Investigations team continues its investigation of the Log4j vulnerability. Using our global scanning technology, we’ve developed insights into the scope and extent of the Log4j vulnerability.
More DetailsCyber Threat Intelligence -
Blog, Learning Center
First-Party vs Third-Party Cyber Insurance: What’s the Difference?
December 6, 2021First-party and third-party cyber insurance work to protect your business from serious financial and reputational damage that may result from a data breach. Learn more.
More DetailsCyber Insurance, Tech Center -
Learning Center
Guide to Performing a Data Risk Assessment
November 24, 2021Check out this guide to performing a data risk assessment that explains what it is, why it’s important, and how to engage in one. Read more
More DetailsTech Center -
Learning Center
What is Compliance Management and Why Is It Important?
November 11, 2021Compliance management is the process of monitoring an organization’s network to ensure they comply with legal and industry requirements. Learn more.
More DetailsTech Center -
Learning Center
What are Information Security Controls?
November 11, 2021What are information security controls and what type does my organization need? Learn more on SecurityScorecard's blog.
More DetailsTech Center