Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Learning Center
How to Design an Effective Cybersecurity Policy
August 11, 2021More DetailsTech Center -
Learning Center
8 Internet of Things Threats and Risks to Be Aware of
August 4, 2021More DetailsTech Center -
Learning Center
10 Common Cyber Attack Vectors and How to Avoid Them
July 28, 2021When it comes to cybercrime, cybercriminals are constantly changing their tactics. Think back to 10 years ago; malware sites — malicious sites that attempt to install malware on a device – were a common attack vector. At the same time, sophisticated ransomware attacks on organizations were rare. Often, ransomware was used to target individuals, sometimes blackmailing them for having been on unsavory sites and asking for a few hundred dollars in ransom.
More DetailsTech Center -
Learning Center
What is Zero Trust Architecture? 9 Steps to Implementation
July 14, 2021Understanding what a Zero Trust Architecture is and how to implement one can help enhance security. Learn more on SecurityScorecard's blog.
More DetailsAttack Surface Management, Tech Center -
Learning Center
8 Top Strategies for Cybersecurity Risk Mitigation
July 12, 2021More DetailsTech Center -
Learning Center
16 Countries with GDPR-like Data Privacy Laws
July 8, 2021More DetailsMike Woodward
Tech Center -
Learning Center
What is the ICT Supply Chain? Things Your Business Needs to Know
June 28, 2021The ICT supply chain is the sequence of actions that transform raw resources into ICT products and services such as computer hardware, software, and subscriptions. Learn more.
More DetailsTech Center -
Learning Center
What is Access Control? Components and Types
June 22, 2021Digital transformation changes the perimeter. When organizations had all their applications on-premises, the network firewall kept the right users inside the gate and malicious actors outside. However, the move to the cloud changed all that. In today’s hyper-connected ecosystem, understanding the components and types of access control can help you strengthen security.
More DetailsTech Center -
Blog, Learning Center
JBS Ransomware Attack Started in March and Much Larger in Scope than Previously Identified
June 8, 2021SecurityScorecard found that the JBS ransomware attack started in March and is much larger in scope than previously identified. Check out SecurityScorecard's research.
More DetailsCyber Threat Intelligence -
Learning Center
How to Identify and Prepare for Network Security Threats and Vulnerabilities
May 26, 2021Network security threats are constantly evolving. Find out how to identify network threats and address vulnerabilities to protect your organization.
More DetailsTech Center