Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
EbookCISO Action Plan
A challenge exists in modern organizations: to improve the quality and effectiveness of formal and informal communications between the Chief Information Security Officer (CISO) and other senior executives, including the C-suite and board members. This ebook presents action plans to help CISOs and senior executives find common ground.
More Details -
EbookEvolve from Risk Management to Risk Intelligence
Proven Strategies to Drive a Risk Intelligence Program in Your Organization
More Details -
ResearchSecurityScorecard Validation Assessment Summary
Online found SecurityScorecard’s footprinting to be very accurate. Over the course of testing Online evaluated SecurityScorecard’s data for a total of 13 unique, unrelated, and randomly selected domains and found SecurityScorecard’s attribution process to have an accuracy of 95%. The accuracy for positively attributing IP Addresses was found to be 94% while for DNS Records it was found to be 100%.
More DetailsVlad Pasca
-
White PaperDORA and Cyber Risk: A New Framework for Third-Party Risk in the European Union
DORA is an effort to build resilience within the financial service sector by requiring financial services organizations to establish and monitor networks of trust amongst themselves and their ICT vendors. However, trust requires verification through monitoring and transparency.
More DetailsVlad Pasca
Attack Surface Management, Cyber Threat Intelligence, DORA, Enterprise Cyber Risk, Security Ratings, Supply Chain Cyber Risk -
Data SheetSolution Brief: SecurityScorecard MAX
See how SecurityScorecard MAX strengthens operational resilience, enhances third-party risk management, and mitigates concentrated risk.
More Details -
Learning CenterKerberos vs. LDAP: Choosing the Right Enterprise Protocol
June 5, 2025Kerberos and LDAP serve different roles in enterprise security. This guide compares their features, use cases, and integration with modern access control strategies.
More Details -
Learning CenterWhat You Need To Know About DeepSeek Security Issues and Vulnerabilities
June 10, 2025DeepSeek is a powerful AI model with significant enterprise applications. But it also introduces security risks, according to SecurityScorecard STRIKE Team’s research.
More Details -
Learning CenterWhat Is MXToolbox and How Can You Use It Securely?
June 23, 2025Discover how MXToolbox works for DNS, SPF, and blacklist monitoring, and learn how to use it securely without leaking email infrastructure insights to threat actors.
More Details -
Learning CenterWhat Is Triage in Cybersecurity Incident Response?
June 24, 2025Discover how cybersecurity triage works during incident response. Learn best practices for assessing and prioritizing threats before they escalate.
More Details -
Learning CenterWhat Does CIRCIA Require—and How Can You Prepare for Reporting Cyber Incidents?
June 25, 2025Learn what the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) requires, who it applies to, and how your organization can prepare for faster, smarter breach response.
More Details -
Learning CenterWhy Education is a Growing Cyber Target
June 25, 2025Why educational institutions face rising cyberattacks and what they can do to improve their cybersecurity posture.
More DetailsCybersecurity
