
Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Learning Center
How to Conduct a Vendor Security Assessment to Identify High-Risk Vendors
January 8, 2020Strong vendor security is critical to your organization’s overall cyber health & resilience. Learn how to conduct a vendor security risk assessment to identify high-risk vendors.
More DetailsTech Center -
Blog, Learning Center
4 Ways to Optimize Your Third Party Cyber Risk Management (TPCRM) Program
January 6, 2020Managing your TPCRM program can be a tedious, time-consuming task, yet it is a critical one. Learn 4 ways to optimize your TPCRM program.
More DetailsSupply Chain Cyber Risk, Tech Center -
Learning Center
Best Practices for Compliance Monitoring in Cybersecurity
January 2, 2020Compliance monitoring is the process of overseeing business operations to ensure your organization is aligned with various regulatory mandates. Learn how to build a compliance monitoring program.
More DetailsServices, Tech Center -
Learning Center
Network Security Assessments: What They Are And Why You Need Them
December 20, 2019Learn the importance of network security assessments to identify vulnerabilities, address risks, and meet compliance requirements effectively.
More DetailsAttack Surface Management, Tech Center -
Case Study
Modulr Case Study
December 3, 2019By using SecurityScorecard, Modulr was also able to decrease operational costs, increase objectivity, reduce human error and more. Read the case study.
More Details -
Case Study
Horizon Media Case Study
October 30, 2019With the help of SecurityScorecard’s ratings and company’s compliance policies, the firm is able to maintain a perfect Scorecard rating, and thus delivers on its promise to secure and protect its customers’ data. Additionally, Horizon Media is uniquely positioned in the media advertising industry to leverage its ‘A’ cybersecurity risk rating, which offers them a significant competitive advantage, especially for ‘big name’ deals.
More Details -
Learning Center
10 Ways to Engage Employees During National Cybersecurity Awareness Month
October 19, 2019Do you know how cyber aware your employees are? Check out these 10 ways to engage employees during National Cybersecurity Awareness Month.
More DetailsTech Center -
Learning Center
5 Ways to Meet Regulatory Compliance and Standards Requirements
October 17, 2019More DetailsTech Center -
Case Study
Axcient Case Study
October 8, 2019By creating an interdepartmental knowledge base for security using SecurityScorecard’s easy-to-read security ratings, everyone from leadership down through the company could identify issues, have meaningful conversations, and establish cyber confidence. These cross-enterprise conversations built stronger relationships between the security team, leadership, and marketing that focused on security’s benefits.
More Details -
Case Study
Children’s Hospital of Minnesota Case Study
October 8, 2019Children's has used the breadth and depth of findings surfaced by the SecurityScorecard platform to show that there are risks that must be quantified and considered in determining what level of risk is acceptable. Providing this sort of education and visibility on risk management at the board level is one of the contributing factors that has allowed the team to improve the cybersecurity health of Children’s Minnesota- progress they are able to easily quantify and report on.
More Details -
Case Study
Gunderson Dettmer Case Study
October 8, 2019With SecurityScorecard, the firm maintains continuous visibility into the cyberhealth of its IT infrastructure and can easily provide a snapshot of its security posture to elevate awareness among internal stakeholder and instill confidence across the diverse range of companies in its client portfolio.
More Details -
Case Study
Healthcare Case Study
October 8, 2019This well-known insurance provider leverages SecurityScorecard as a marketing tool to assure customers of the security of their data by providing SecurityScorecard reports in the RFP process, comparing its cybersecurity profile against its competitors, providing an additional independent verification of the company’s and its vendors’ cybersecurity practices and showcasing the effectiveness of the company’s continuous monitoring.
More DetailsHealthcare