Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
White Paper
Applying Machine Learning To Optimize The Correlation Of Securityscorecard Scores With Relative Likelihood Of Breach
October 15, 2020We conducted a study, investigating the use of Machine Learning (ML) to tune the weighting of each of the risk factors so that the total score is optimally correlated with the relative likelihood of incurring a data breach. Download the white paper to learn more.
More DetailsBob Sohval, PhD
Security Ratings -
Learning Center
Cybersecurity Audit vs. Cybersecurity Assessment: What’s the Difference?
October 7, 2020Cybersecurity assessments and audits are often discussed interchangeably. While the two are related, assessments and audits are distinct cybersecurity and compliance evaluation mechanisms. It’s important for security leaders to understand exactly how the two function in order to drive organizational cyber maturity and meet industry-specific regulatory requirements.
More DetailsTech Center -
Learning Center
How Can You Secure Risky Open Ports?
October 1, 2020Open network ports enable organizations to adopt cloud strategies. However, each port is technically a small gateway into an organization’s IT stack. Learn how you can security risky open ports.
More DetailsTech Center -
Learning Center
What’s the Role of Cybersecurity in Procurement?
September 23, 2020As a company’s IT stack adds more e-procurement tools, the role of cybersecurity in the procurement process becomes integral to protecting sensitive corporate data and mitigating the risks within a supply chain. Learn more on SecurityScorecard's blog.
More DetailsTech Center -
Learning Center
7 Essential Third-Party Risk Management (TPRM) Tools
September 16, 2020Organizations that still rely on inefficient manual processes face a higher risk of a cyber breach, as well as reputational or regulatory repercussions. With the right TPRM tools in place, IT and security teams can streamline, and maximize the effectiveness of their tools and procedures so they can keep up with the demands of their businesses. While multiple factors will determine the exact needs of a particular organization, here are seven tools that are essential to managing any vendor ecosystem.
More DetailsTech Center -
Learning Center
How to Justify Your Cybersecurity Budget
September 14, 2020Organizations know they need cybersecurity, but security leaders still struggle to get the funding necessary. CISOs looking to justify their cybersecurity budgets need ways to prove return on investment, provide metrics for measuring success, and ensure continued year-over-year value.
More DetailsTech Center -
Learning Center
A Security Operations Center (SOC) Report Template for the C-Suite
September 2, 2020More DetailsTech Center -
Learning Center
Patch Cadence & Patch Management Best Practices
August 31, 2020Businesses can reduce vulnerabilities by implementing patch cadence and management throughout cybersecurity operations. Learn more about patch cadence and how it can help your business.
More DetailsTech Center -
Case Study
Truphone Case Study
August 28, 2020Information provided by SecurityScorecard is integral to Truphone’s business continuity management in securing the entirety of its supply chain. Streamlining operations through intuitive, customizable groupings of IPs, vendors, and data points saves time, while the added visibility Nuno Teodoro pointed out, “lets us sleep at night.”
More Details -
Blog
Calculating the ROI of Security Ratings.
August 24, 2020It can be difficult to show leadership metrics that prove that you’re saving money because of incidents that haven’t happened. Fortunately, there are a number of qualitative ways to prove to your board and investors that your investment in security ratings is saving your paying off.
More DetailsSecurity Ratings -
Blog, Learning Center
What Is a Cybersecurity Audit and Why Does it Matter?
August 17, 2020As organizations adopt new digital technologies, their risk of being targeted in cyberattacks grows. The increased network complexity that comes as a result of digital innovation often creates new network gaps for cyber adversaries to exploit. If left unchecked, these risks can undermine organizational objectives which is why it is critical that businesses have effective cybersecurity programs in place. A key component to the success of these programs is the administration of cybersecurity audits.
More DetailsTech Center -
Blog, Learning Center
What is a Third-Party Vendor? Tips for Managing Vendor Risk
July 23, 2020A third-party vendor is any company or entity with a direct written contract to provide goods or services to your customers on your behalf. Explore 3 best practices for third-party risk management.
More DetailsAttack Surface Management, Tech Center