Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Blog
Reimagining Supply Chain Cybersecurity
August 28, 2024Many security teams aren’t aware of the various supply chain cyber risks lurking within their network, most of which are difficult to detect, manage, and mitigate. Let's explore how to achieve a more secure and resilient supply chain.
More DetailsSupply Chain Cyber Risk, Third-Party Risk Management -
Blog
Building a Resilient Supply Chain in the Face of Cyber Threats
August 27, 2024Explore lessons learned from recent cyber outages and actionable insights for enhancing supply chain resilience.
More DetailsProfessional Services, Supply Chain Cyber Risk, Third-Party Risk Management -
Webinar
Becoming Supply Chain Resilient: Lessons from Recent Cyber Outages
August 22, 2024Learn how to enhance your organization's cyber resilience, mitigate supply chain risks, and future-proof your organization for incidents.
More DetailsSupply Chain Cyber Risk, Third-Party Risk Management -
Blog
Continuous Accountability: Leveraging Contracts to Secure your Supply Chain
August 14, 2024A critical problem for security and legal professionals who manage supply chain risk is that cybersecurity risks are dynamic and always shifting.
More DetailsOwen Denby, General Counsel, SecurityScorecard
-
Blog
SecurityScorecard is now part of AWS OMNIA
August 14, 2024SecurityScorecard is excited to announce that we are now an AWS OMNIA partner. This unlocks a critical opportunity for the 90,000 buying organizations that make up the OMNIA partner network to reduce and manage Supply Chain Cyber Risks.
More DetailsAWS -
Webinar
Best Practices for Implementing a Cyber Risk Managed Service
August 14, 2024More DetailsSupply Chain Cyber Risk, Third-Party Risk Management -
Blog
SecurityScorecard and ServiceNow Expand Partnership with New Capabilities for TPRM and Security Incident Response (SIR)
August 8, 2024ServiceNow and SecurityScorecard have been longtime strategic partners, helping mutual customers measure and manage cyber risk. Today we’re highlighting the next phase of our partnership and innovation to help customers tackle the complex challenges associated with managing cyber risk in the third party ecosystem.
More Details -
Webinar
Third-Party Risk Management: Detecting and Responding to Supply Chain Cyber Risks
August 8, 2024More DetailsSupply Chain Cyber Risk, Third-Party Risk Management -
Blog
“What’s our number?”: Responding To Your Exposure to CrowdStrike Outage Event
August 7, 2024More DetailsAndrew Correll
-
Blog
“More Money, More Problems:” Supply Chain Cyber Risk in the Forbes Global 2000
August 6, 2024SecurityScorecard and its partner Cyentia recently released our joint case study of third-party cyber risk in the Forbes Global 2000 group of the world’s financially largest companies. On one hand, large companies have the advantage of greater financial and human resources to invest in security programs. Security costs money, and other SecurityScorecard research has established a correlation between cyber security hygiene on one hand and financial means on the other. On the other hand, greater size means that larger companies have more attack surface to protect and greater third-party risk exposure through their typically larger number of vendors and other third parties, as SecurityScorecard also found in an analysis of large technology companies. This paper delves further into the heightened risk exposure that comes with operating at a larger scale.
More Details -
Blog
SecurityScorecard and AWS Help Make Secure Software Procurement Faster and Easier
August 5, 2024Organizations increasingly rely on third parties for business operations, and as a result are working with more digital suppliers than ever. According to Gartner, 60% of organizations work with more than 1,000 third parties and this number will grow.
More DetailsFrankie Berry
AWS -
Blog
Up Level Your Amazon Security Lake with Attack Surface Intelligence
August 5, 2024As global network infrastructure expands to include devices without traditional compute power, every organization’s attack surface becomes increasingly complex. Parallel to the increased complexity in the threat landscape is the increased scale and complexity of the signals and data necessary to produce meaningful cybersecurity insights. At its core, cybersecurity is a big data problem, requiring centralization of disparate data sources in uniform structure to enable continuous analytics.
More DetailsTim Erlin & Anna Sarnek