Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Learning Center
What is Cyber Risk? Definition & Examples
March 17, 2021Businesses have always faced different kinds of risk, but in the last two decades, cyber risk has become one of the fastest-growing threats to businesses, their data, and their financial success today. Learn more.
More DetailsTech Center -
Blog, Learning Center
How to Resolve Findings on Your SecurityScorecard Rating
March 16, 2021Understanding how to remediate and resolve SecurityScorecard security ratings findings can help you iterate your cybersecurity and compliance program for continued visibility into your risk posture. Find out more.
More DetailsSecurity Ratings -
Blog, Learning Center
34 Resources for Employee Cybersecurity Training
March 8, 2021Cybersecurity is a team effort. Check out these 34 resources for employee cybersecurity training.
More DetailsTech Center -
Learning Center
41 Common Web Application Vulnerabilities Explained
March 5, 2021More DetailsTech Center -
Learning Center
What is a Cybersecurity Vulnerability? Definition and Types
February 25, 2021With networks growing in complexity, being able to actively manage cybersecurity vulnerabilities is a necessity. Learn more about security vulnerabilities and how they can be managed.
More DetailsTech Center -
Blog, Learning Center
10 Examples of Recent and Impactful Ransomware Attacks
February 24, 2021With the cost of ransomware attacks growing, organizations must remain aware of the different ransomware variants used to compromise systems. Learn more about key ransomware threats
More DetailsCyber Threat Intelligence, Tech Center -
Learning Center
30 Best Practices for Preventing a Data Breach
February 22, 2021Check out these 30 best practices for preventing a data breach that can help reduce the risk and respond to an attack more effectively. Learn more on SecurityScorecard's blog.
More DetailsTech Center -
Learning Center
5 Network Segmentation Best Practices to Maximize Cybersecurity
February 17, 2021While preventing attacks is the goal of cybersecurity, it’s also important to realize an attack can happen and make plans to mitigate the impact of a successful breach. Check out these network segmentation best practices to maximize cybersecurity.
More DetailsTech Center -
Learning Center
4 Best Practices for Effective Reputational Risk Management
January 13, 2021Just as a strong reputation can help attract new business, a poor reputation can drive potential customers away, leading to financial loss. This is why many organizations are beginning to invest in reputational risk management programs. Here we'll outline four best practices you can follow to effectively manage reputational risk at your organization.
More DetailsTech Center -
Case Study
Healthwise Case Study
January 8, 2021Healthwise found that SecurityScorecard’s risk monitoring platform was the ideal solution to its third-party risk management challenges. Healthwise has integrated the platform as part of the new third-party due diligence process.
More Details -
White Paper
How To Manage Third-Party Digital Risk
January 6, 2021Addressing data breaches outside your company is vital to managing your third-party digital risk. Download this white paper and learn about the implication of third-party data leaks, how to prevent and manage data leaks, and more.
More DetailsAttack Surface Management, Enterprise Cyber Risk, Security Ratings, Supply Chain Cyber Risk -
Learning Center
7 Essential Cyber Risk Assessment Tools
January 6, 2021More DetailsMiryam Meir
Tech Center