Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Learning Center
What is Continuous Cybersecurity Monitoring?
November 9, 2020Recommended: Cybersecurity monitoring is a threat detection strategy that uses automation to continuously scan your IT ecosystem for control weaknesses. Learn more.
More DetailsTech Center -
White Paper
Applying Machine Learning To Optimize The Correlation Of Securityscorecard Scores With Relative Likelihood Of Breach
October 15, 2020We conducted a study, investigating the use of Machine Learning (ML) to tune the weighting of each of the risk factors so that the total score is optimally correlated with the relative likelihood of incurring a data breach. Download the white paper to learn more.
More DetailsBob Sohval, PhD
Security Ratings -
Data Sheet
How Do Security Ratings Work?
October 15, 2020SecurityScorecard provides transparency into our ratings methodology and delivers insights into how it aligns with industry standards. Understand the principles, methodology, and process behind how our cybersecurity ratings work.
More DetailsSecurity Ratings -
Learning Center
Cybersecurity Audit vs. Cybersecurity Assessment: What’s the Difference?
October 7, 2020Cybersecurity assessments and audits are often discussed interchangeably. While the two are related, assessments and audits are distinct cybersecurity and compliance evaluation mechanisms. It’s important for security leaders to understand exactly how the two function in order to drive organizational cyber maturity and meet industry-specific regulatory requirements.
More DetailsTech Center -
Learning Center
How Can You Secure Risky Open Ports?
October 1, 2020Open network ports enable organizations to adopt cloud strategies. However, each port is technically a small gateway into an organization’s IT stack. Learn how you can security risky open ports.
More DetailsTech Center -
Learning Center
What’s the Role of Cybersecurity in Procurement?
September 23, 2020As a company’s IT stack adds more e-procurement tools, the role of cybersecurity in the procurement process becomes integral to protecting sensitive corporate data and mitigating the risks within a supply chain. Learn more on SecurityScorecard's blog.
More DetailsTech Center -
Learning Center
7 Essential Third-Party Risk Management (TPRM) Tools
September 16, 2020Organizations that still rely on inefficient manual processes face a higher risk of a cyber breach, as well as reputational or regulatory repercussions. With the right TPRM tools in place, IT and security teams can streamline, and maximize the effectiveness of their tools and procedures so they can keep up with the demands of their businesses. While multiple factors will determine the exact needs of a particular organization, here are seven tools that are essential to managing any vendor ecosystem.
More DetailsTech Center -
Learning Center
How to Justify Your Cybersecurity Budget
September 14, 2020Organizations know they need cybersecurity, but security leaders still struggle to get the funding necessary. CISOs looking to justify their cybersecurity budgets need ways to prove return on investment, provide metrics for measuring success, and ensure continued year-over-year value.
More DetailsTech Center -
Learning Center
A Security Operations Center (SOC) Report Template for the C-Suite
September 2, 2020More DetailsTech Center -
Learning Center
Patch Cadence & Patch Management Best Practices
August 31, 2020Businesses can reduce vulnerabilities by implementing patch cadence and management throughout cybersecurity operations. Learn more about patch cadence and how it can help your business.
More DetailsTech Center -
Case Study
Truphone Case Study
August 28, 2020Information provided by SecurityScorecard is integral to Truphone’s business continuity management in securing the entirety of its supply chain. Streamlining operations through intuitive, customizable groupings of IPs, vendors, and data points saves time, while the added visibility Nuno Teodoro pointed out, “lets us sleep at night.”
More Details -
Blog
Calculating the ROI of Security Ratings.
August 24, 2020It can be difficult to show leadership metrics that prove that you’re saving money because of incidents that haven’t happened. Fortunately, there are a number of qualitative ways to prove to your board and investors that your investment in security ratings is saving your paying off.
More DetailsSecurity Ratings