Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Learning Center
10 Common Cyber Attack Vectors and How to Avoid Them
July 28, 2021When it comes to cybercrime, cybercriminals are constantly changing their tactics. Think back to 10 years ago; malware sites — malicious sites that attempt to install malware on a device – were a common attack vector. At the same time, sophisticated ransomware attacks on organizations were rare. Often, ransomware was used to target individuals, sometimes blackmailing them for having been on unsavory sites and asking for a few hundred dollars in ransom.
More DetailsTech Center -
Learning Center
What is Zero Trust Architecture? 9 Steps to Implementation
July 14, 2021Understanding what a Zero Trust Architecture is and how to implement one can help enhance security. Learn more on SecurityScorecard's blog.
More DetailsAttack Surface Management, Tech Center -
Learning Center
8 Top Strategies for Cybersecurity Risk Mitigation
July 12, 2021More DetailsTech Center -
Learning Center
16 Countries with GDPR-like Data Privacy Laws
July 8, 2021More DetailsMike Woodward
Tech Center -
Learning Center
What is the ICT Supply Chain? Things Your Business Needs to Know
June 28, 2021The ICT supply chain is the sequence of actions that transform raw resources into ICT products and services such as computer hardware, software, and subscriptions. Learn more.
More DetailsTech Center -
Learning Center
What is Access Control? Components and Types
June 22, 2021Digital transformation changes the perimeter. When organizations had all their applications on-premises, the network firewall kept the right users inside the gate and malicious actors outside. However, the move to the cloud changed all that. In today’s hyper-connected ecosystem, understanding the components and types of access control can help you strengthen security.
More DetailsTech Center -
Blog, Learning Center
JBS Ransomware Attack Started in March and Much Larger in Scope than Previously Identified
June 8, 2021SecurityScorecard found that the JBS ransomware attack started in March and is much larger in scope than previously identified. Check out SecurityScorecard's research.
More DetailsCyber Threat Intelligence -
Learning Center
How to Identify and Prepare for Network Security Threats and Vulnerabilities
May 26, 2021Network security threats are constantly evolving. Find out how to identify network threats and address vulnerabilities to protect your organization.
More DetailsTech Center -
Learning Center
Top 11 IoT Cybersecurity Challenges Facing Businesses
May 17, 2021As companies increasingly adopt Internet of Things (IoT) devices to enable business operations, they need to consider the following IoT cybersecurity risks and find ways to adequately mitigate them. Learn more.
More DetailsTech Center -
Learning Center
Integrating Cybersecurity into Business Continuity Planning
May 12, 2021By integrating cybersecurity into business continuity planning (BCP), organizations can enable collaboration across teams. Explore tips for combining BCP and cybersecurity.
More DetailsTech Center