
Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Case Study
Healthcare Software Company Keeps Patient Data Safe With SecurityScorecard
June 23, 2022Access uses SecurityScorecard to gain full visibility into the organization’s cyber risk, allowing the company to quickly identify and remediate vulnerabilities so that hospitals and their patient data stay safe.
More DetailsHealthcare -
Learning Center
Incident Response vs. Disaster Recovery: Key Differences
June 23, 2022While they both fight the same threats to protect your business from a security threat and breach, incident response vs. disaster recovery plans have their differences. Learn more.
More DetailsTech Center -
Learning Center
What is Vendor Tiering? Tips to Improve Your Vendor Risk Management
June 22, 2022Vendor tiering is the process of identifying, analyzing, and classifying vendors based on their security risks. Learn how your business can improve your vendor risk management.
More DetailsTech Center -
Learning Center
The Value of Communicating Risk Meaningfully Across the Business
June 20, 2022While cybersecurity might be under the umbrella of IT, make no mistake: a breach will impact the entire business, making it the entire organization’s responsibility to be able to understand and take action on risk. Your organization needs to have a holistic view of risk that can enable technical and business conversations about cyber risk. By understanding not just the nuts and bolts of an exploit, but the impact it can have on employees, customers, and revenue, security experts and business leaders alike can then prioritize actions, budgets, and initiatives.
More DetailsTech Center -
Research
Cyentia Fast And Frivolous
June 6, 2022Pacing Remediation of Internet-Facing Vulnerabilities
More Details -
Learning Center
5 Ways to Effectively Prevent Data Leakage
May 25, 2022Explore how you can stop data leakage with a solution that identifies and combats vulnerabilities inherent within your business. Learn more.
More DetailsTech Center -
Blog
KillNet Utilizes CC-Attack: A Quick & Dirty DDoS Method
May 25, 2022SecurityScorecard's analysis of CC-Attack reveals the script automates the process of using open proxy servers to relay attacks.
More DetailsCyber Threat Intelligence, STRIKE Team -
Data Sheet
SecurityScorecard and OneTrust Solution Brief
May 16, 2022Automate and scale your third-party risk management with SecurityScorecard and OneTrust
More DetailsSupply Chain Cyber Risk -
Research
A Deep Dive into Avos Locker Ransomware
May 5, 2022AvosLocker is a ransomware-as-a-service (RaaS) group that appeared in 2021. The malware can run with one of the following parameters: “--help”, “--path”, “--disabledrives”, “--hide”, “--threads”, “--enablesmb”, “--brutesmb”, and “--nomutex.” The ransomware kills a list of targeted processes, deletes all Volume Shadow Copies using two commands, and clears all Windows event logs. The binary can target the logical drives as well as network shares by specifying proper arguments.
More Details -
Press
New York Department of Financial Services Establishes First-of-its-Kind Use Case with SecurityScorecard to Modernize Regulatory Oversight
May 4, 2022SecurityScorecard, the global leader in cybersecurity ratings, is now working with the New York State Department of Financial Services (DFS) to further support the department’s first-in-the-nation cybersecurity efforts to modernize its supervision process.
More Details