
Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Learning Center
What Is an Attack Vector? 8 Common Examples
January 16, 2025Attack vectors are the means or tactics used by cyber criminals to gain unauthorized access to a network. Explore common attack vectors and learn how you can defend against them.
More DetailsAttack Surface Management, Tech Center -
Blog, Research
Operation 99: North Korea’s Cyber Assault on Software Developers
January 15, 2025On January 9, the SecurityScorecard STRIKE team uncovered Operation 99, a cyberattack by the Lazarus Group, North Korea’s state-sponsored hacking unit.
More DetailsRyan Sherstobitoff, SVP, Threat Research & Intelligence in Threat Intelligence
STRIKE Team -
Blog
Assembling the Dream Team: Building a High-Performing Supply Chain Incident Response Team
January 15, 2025This article explores the key elements of building a high-performing supply chain incident response team to effectively mitigate and respond to these threats.
More DetailsSCDR -
Blog
How Security Ratings Help Build Strong Business Relationships
January 14, 2025See how security ratings allow you to strengthen business relationships by giving you the information you need to enable stronger business outcomes. Learn more about security ratings for business.
More Details -
Blog
Securing Patient Data: A Guide to Managed Services for Supply Chain Detection and Response in Healthcare
January 14, 2025Patient data is among the most sensitive and valuable information in the healthcare industry. A single breach can have devastating consequences. Learn how a managed service for SCDR can help.
More DetailsSCDR -
Blog
Securing Your Financial Ecosystem: A Guide to Managed Services for Supply Chain Detection and Response
January 10, 2025This blog explores the critical role of Managed Services for Supply Chain Detection and Response (SCDR) in securing your financial institution.
More DetailsSCDR -
Blog
Day in the Life of a CISO: A Vendor Breach: Assessing Our Exposure
December 19, 2024Day in the Life of a CISO: A Vendor Breach: Assessing Our Exposure
More Details -
Press
SecurityScorecard Announces Integration with Buy with AWS
December 17, 2024SecurityScorecard Announces Integration with Buy with AWS, Offering Simplified Procurement for AWS Customers
More Details -
Blog
Securing Your Healthcare Supply Chain: A Guide to Supply Chain Detection and Response
December 17, 2024In today's interconnected healthcare landscape, supply chain security has emerged as a critical concern. Cyber threats are becoming increasingly sophisticated, targeting vulnerable points in the supply chain to infiltrate networks and steal sensitive patient data. As a result, healthcare organizations must prioritize the security of their vendors and partners to protect their own operations and patient information.
More DetailsHealthcare, SCDR -
Blog
Scorecarder Spotlight: Portia Phillips
December 17, 2024Our series “Scorecarder Spotlight” showcases our talented employees and the incredible work they do. Meet Portia Phillips!
More DetailsScorecarder Spotlight -
Blog
Day in the Life of a CISO: Evaluating a Plugin Vendor
December 13, 2024Day in the Life of a CISO: Evaluating a Plugin Vendor
More Details