Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Learning Center
How to Conduct a Vendor Security Assessment to Identify High-Risk Vendors
January 8, 2020Strong vendor security is critical to your organization’s overall cyber health & resilience. Learn how to conduct a vendor security risk assessment to identify high-risk vendors.
More DetailsTech Center -
Blog, Learning Center
4 Ways to Optimize Your Third Party Cyber Risk Management (TPCRM) Program
January 6, 2020Managing your TPCRM program can be a tedious, time-consuming task, yet it is a critical one. Learn 4 ways to optimize your TPCRM program.
More DetailsSupply Chain Cyber Risk, Tech Center -
Learning Center
Best Practices for Compliance Monitoring in Cybersecurity
January 2, 2020Compliance monitoring is the process of overseeing business operations to ensure your organization is aligned with various regulatory mandates. Learn how to build a compliance monitoring program.
More DetailsServices, Tech Center -
Learning Center
Network Security Assessments: What They Are And Why You Need Them
December 20, 2019As technology continues to get smarter, the need for a secure network is at an all-time high. Find out how to conduct a network security assessment and strengthen your system’s defenses.
More DetailsAttack Surface Management, Tech Center -
Learning Center
What is a Cybersecurity Posture and How Can You Evaluate It?
December 19, 2019The term “cybersecurity posture” refers to the strength of an organization’s controls, protocols, and defense against cyber attacks. Learn how to strengthen your cyber posture and protect against cyber threats.
More DetailsTech Center -
Learning Center
What is IT Risk Management? A Complete Guide
December 11, 2019More DetailsTech Center -
Case Study
Modulr Case Study
December 3, 2019By using SecurityScorecard, Modulr was also able to decrease operational costs, increase objectivity, reduce human error and more. Read the case study.
More Details -
Case Study
Horizon Media Case Study
October 30, 2019With the help of SecurityScorecard’s ratings and company’s compliance policies, the firm is able to maintain a perfect Scorecard rating, and thus delivers on its promise to secure and protect its customers’ data. Additionally, Horizon Media is uniquely positioned in the media advertising industry to leverage its ‘A’ cybersecurity risk rating, which offers them a significant competitive advantage, especially for ‘big name’ deals.
More Details -
Learning Center
10 Ways to Engage Employees During National Cybersecurity Awareness Month
October 19, 2019Do you know how cyber aware your employees are? Check out these 10 ways to engage employees during National Cybersecurity Awareness Month.
More DetailsTech Center -
Learning Center
5 Ways to Meet Regulatory Compliance and Standards Requirements
October 17, 2019More DetailsTech Center -
Case Study
Axcient Case Study
October 8, 2019By creating an interdepartmental knowledge base for security using SecurityScorecard’s easy-to-read security ratings, everyone from leadership down through the company could identify issues, have meaningful conversations, and establish cyber confidence. These cross-enterprise conversations built stronger relationships between the security team, leadership, and marketing that focused on security’s benefits.
More Details -
Case Study
Children’s Hospital of Minnesota Case Study
October 8, 2019Children's has used the breadth and depth of findings surfaced by the SecurityScorecard platform to show that there are risks that must be quantified and considered in determining what level of risk is acceptable. Providing this sort of education and visibility on risk management at the board level is one of the contributing factors that has allowed the team to improve the cybersecurity health of Children’s Minnesota- progress they are able to easily quantify and report on.
More Details