Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Case Study
Healthwise Case Study
January 8, 2021Healthwise found that SecurityScorecard’s risk monitoring platform was the ideal solution to its third-party risk management challenges. Healthwise has integrated the platform as part of the new third-party due diligence process.
More Details -
White Paper
How To Manage Third-Party Digital Risk
January 6, 2021Addressing data breaches outside your company is vital to managing your third-party digital risk. Download this white paper and learn about the implication of third-party data leaks, how to prevent and manage data leaks, and more.
More DetailsAttack Surface Management, Enterprise Cyber Risk, Security Ratings, Supply Chain Cyber Risk -
Learning Center
7 Essential Cyber Risk Assessment Tools
January 6, 2021More DetailsMiryam Meir
Tech Center -
Learning Center
6 Cybersecurity Metrics Every CISO Should Monitor
December 7, 2020By tracking the right metrics, Chief Information Security Officers (CISOs) can monitor the effectiveness of their processes and controls overtime, evaluate team performance, and show return on investment (ROI) of security spending at the board level. Here is a list of metrics that can help CISOs prioritize and maximize their efforts, and conduct more effective security reporting at the board level, so they can drive value and growth within their organizations.
More DetailsSecurity Ratings, Tech Center -
Case Study
Truphone One-Page Case Study
December 2, 2020Now that Truphone relies on SecurityScorecard for continuous monitoring, there is peace of mind. “With SecurityScorecard it’s fire and forget, because we know the platform will catch everything and surface all of our assets,” said Nuno Teodoro. Having SecurityScorecard has brought benefits across all of the Security and IT team’s responsibilities.
More Details -
Learning Center
What is Attack Surface Management?
November 23, 2020Organizations are facing increased pressure to adopt digital solutions to stay competitive. While these solutions have undoubted benefits for organizations, they also expand their potential attack surface and expose them to increased levels of cyber risk. To help stay protected, many organizations are adopting cyber attack surface management programs that work to continually assess their networks for potential threats. Cyber attack surface management is the process of identifying all networks within a business that can be infiltrated, classifying areas of risk, prioritizing high-risk areas, and continuously monitoring an organization’s attack surface.
More DetailsAttack Surface Management, Tech Center -
Learning Center
What’s Wrong with Two-Factor Authentication?
November 17, 2020Though requiring an extra identifier does deter some hackers from attacking systems defended with two-factor authentication, it is not always your safest option. Find out more on SecurityScorecard's blog.
More DetailsTech Center -
Learning Center
What is Continuous Cybersecurity Monitoring?
November 9, 2020Recommended: Cybersecurity monitoring is a threat detection strategy that uses automation to continuously scan your IT ecosystem for control weaknesses. Learn more.
More DetailsTech Center -
White Paper
Applying Machine Learning To Optimize The Correlation Of Securityscorecard Scores With Relative Likelihood Of Breach
October 15, 2020We conducted a study, investigating the use of Machine Learning (ML) to tune the weighting of each of the risk factors so that the total score is optimally correlated with the relative likelihood of incurring a data breach. Download the white paper to learn more.
More DetailsBob Sohval, PhD
Security Ratings -
Data Sheet
How Do Security Ratings Work?
October 15, 2020SecurityScorecard provides transparency into our ratings methodology and delivers insights into how it aligns with industry standards. Understand the principles, methodology, and process behind how our cybersecurity ratings work.
More DetailsSecurity Ratings -
Learning Center
Cybersecurity Audit vs. Cybersecurity Assessment: What’s the Difference?
October 7, 2020Cybersecurity assessments and audits are often discussed interchangeably. While the two are related, assessments and audits are distinct cybersecurity and compliance evaluation mechanisms. It’s important for security leaders to understand exactly how the two function in order to drive organizational cyber maturity and meet industry-specific regulatory requirements.
More DetailsTech Center -
Learning Center
How Can You Secure Risky Open Ports?
October 1, 2020Open network ports enable organizations to adopt cloud strategies. However, each port is technically a small gateway into an organization’s IT stack. Learn how you can security risky open ports.
More DetailsTech Center