![](https://securityscorecard.com/wp-content/uploads/2024/06/SSC_Updated_Resources-17-scaled.webp)
Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Case Study
Truphone One-Page Case Study
December 2, 2020Now that Truphone relies on SecurityScorecard for continuous monitoring, there is peace of mind. “With SecurityScorecard it’s fire and forget, because we know the platform will catch everything and surface all of our assets,” said Nuno Teodoro. Having SecurityScorecard has brought benefits across all of the Security and IT team’s responsibilities.
More Details -
Learning Center
What’s Wrong with Two-Factor Authentication?
November 17, 2020Though requiring an extra identifier does deter some hackers from attacking systems defended with two-factor authentication, it is not always your safest option. Find out more on SecurityScorecard's blog.
More DetailsTech Center -
Learning Center
What is Continuous Cybersecurity Monitoring?
November 9, 2020Recommended: Cybersecurity monitoring is a threat detection strategy that uses automation to continuously scan your IT ecosystem for control weaknesses. Learn more.
More DetailsTech Center -
White Paper
Applying Machine Learning To Optimize The Correlation Of Securityscorecard Scores With Relative Likelihood Of Breach
October 15, 2020We conducted a study, investigating the use of Machine Learning (ML) to tune the weighting of each of the risk factors so that the total score is optimally correlated with the relative likelihood of incurring a data breach. Download the white paper to learn more.
More DetailsSecurity Ratings -
Data Sheet
How Do Security Ratings Work?
October 15, 2020SecurityScorecard provides transparency into our ratings methodology and delivers insights into how it aligns with industry standards. Understand the principles, methodology, and process behind how our cybersecurity ratings work.
More DetailsSecurity Ratings -
Learning Center
Cybersecurity Audit vs. Cybersecurity Assessment: What’s the Difference?
October 7, 2020Cybersecurity assessments and audits are often discussed interchangeably. While the two are related, assessments and audits are distinct cybersecurity and compliance evaluation mechanisms. It’s important for security leaders to understand exactly how the two function in order to drive organizational cyber maturity and meet industry-specific regulatory requirements.
More DetailsTech Center -
Learning Center
How Can You Secure Risky Open Ports?
October 1, 2020Open network ports enable organizations to adopt cloud strategies. However, each port is technically a small gateway into an organization’s IT stack. Learn how you can security risky open ports.
More DetailsTech Center -
Learning Center
What’s the Role of Cybersecurity in Procurement?
September 23, 2020As a company’s IT stack adds more e-procurement tools, the role of cybersecurity in the procurement process becomes integral to protecting sensitive corporate data and mitigating the risks within a supply chain. Learn more on SecurityScorecard's blog.
More DetailsTech Center -
Learning Center
7 Essential Third-Party Risk Management (TPRM) Tools
September 16, 2020Organizations that still rely on inefficient manual processes face a higher risk of a cyber breach, as well as reputational or regulatory repercussions. With the right TPRM tools in place, IT and security teams can streamline, and maximize the effectiveness of their tools and procedures so they can keep up with the demands of their businesses. While multiple factors will determine the exact needs of a particular organization, here are seven tools that are essential to managing any vendor ecosystem.
More DetailsTech Center -
Learning Center
How to Justify Your Cybersecurity Budget
September 14, 2020Organizations know they need cybersecurity, but security leaders still struggle to get the funding necessary. CISOs looking to justify their cybersecurity budgets need ways to prove return on investment, provide metrics for measuring success, and ensure continued year-over-year value.
More DetailsTech Center -
Learning Center
A Security Operations Center (SOC) Report Template for the C-Suite
September 2, 2020More DetailsTech Center -
Learning Center
Patch Cadence & Patch Management Best Practices
August 31, 2020Businesses can reduce vulnerabilities by implementing patch cadence and management throughout cybersecurity operations. Learn more about patch cadence and how it can help your business.
More DetailsTech Center