Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Blog, Learning Center
10 Examples of Recent and Impactful Ransomware Attacks
February 24, 2021With the cost of ransomware attacks growing, organizations must remain aware of the different ransomware variants used to compromise systems. Learn more about key ransomware threats
More DetailsCyber Threat Intelligence, Tech Center -
Learning Center
30 Best Practices for Preventing a Data Breach
February 22, 2021Check out these 30 best practices for preventing a data breach that can help reduce the risk and respond to an attack more effectively. Learn more on SecurityScorecard's blog.
More DetailsTech Center -
Learning Center
5 Network Segmentation Best Practices to Maximize Cybersecurity
February 17, 2021While preventing attacks is the goal of cybersecurity, it’s also important to realize an attack can happen and make plans to mitigate the impact of a successful breach. Check out these network segmentation best practices to maximize cybersecurity.
More DetailsTech Center -
Learning Center
What Is an Attack Vector? 8 Common Examples
January 25, 2021Attack vectors are the means or tactics used by cyber criminals to gain unauthorized access to a network. Explore common attack vectors and learn how you can defend against them.
More DetailsAttack Surface Management, Tech Center -
Learning Center
4 Best Practices for Effective Reputational Risk Management
January 13, 2021Just as a strong reputation can help attract new business, a poor reputation can drive potential customers away, leading to financial loss. This is why many organizations are beginning to invest in reputational risk management programs. Here we'll outline four best practices you can follow to effectively manage reputational risk at your organization.
More DetailsTech Center -
Case Study
Healthwise Case Study
January 8, 2021Healthwise found that SecurityScorecard’s risk monitoring platform was the ideal solution to its third-party risk management challenges. Healthwise has integrated the platform as part of the new third-party due diligence process.
More Details -
White Paper
How To Manage Third-Party Digital Risk
January 6, 2021Addressing data breaches outside your company is vital to managing your third-party digital risk. Download this white paper and learn about the implication of third-party data leaks, how to prevent and manage data leaks, and more.
More DetailsAttack Surface Management, Enterprise Cyber Risk, Security Ratings, Supply Chain Cyber Risk -
Learning Center
7 Essential Cyber Risk Assessment Tools
January 6, 2021More DetailsMiryam Meir
Tech Center -
Learning Center
6 Cybersecurity Metrics Every CISO Should Monitor
December 7, 2020By tracking the right metrics, Chief Information Security Officers (CISOs) can monitor the effectiveness of their processes and controls overtime, evaluate team performance, and show return on investment (ROI) of security spending at the board level. Here is a list of metrics that can help CISOs prioritize and maximize their efforts, and conduct more effective security reporting at the board level, so they can drive value and growth within their organizations.
More DetailsSecurity Ratings, Tech Center -
Case Study
Truphone One-Page Case Study
December 2, 2020Now that Truphone relies on SecurityScorecard for continuous monitoring, there is peace of mind. “With SecurityScorecard it’s fire and forget, because we know the platform will catch everything and surface all of our assets,” said Nuno Teodoro. Having SecurityScorecard has brought benefits across all of the Security and IT team’s responsibilities.
More Details -
Learning Center
What is Attack Surface Management?
November 23, 2020Organizations are facing increased pressure to adopt digital solutions to stay competitive. While these solutions have undoubted benefits for organizations, they also expand their potential attack surface and expose them to increased levels of cyber risk. To help stay protected, many organizations are adopting cyber attack surface management programs that work to continually assess their networks for potential threats. Cyber attack surface management is the process of identifying all networks within a business that can be infiltrated, classifying areas of risk, prioritizing high-risk areas, and continuously monitoring an organization’s attack surface.
More DetailsAttack Surface Management, Tech Center -
Learning Center
What’s Wrong with Two-Factor Authentication?
November 17, 2020Though requiring an extra identifier does deter some hackers from attacking systems defended with two-factor authentication, it is not always your safest option. Find out more on SecurityScorecard's blog.
More DetailsTech Center