Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
BlogHow CMMC 2.0 Sets a New Standard for Cyber Readiness Across the Defense Industrial Base
December 5, 2025Learn how CMMC 2.0 changes cybersecurity requirements for U.S. defense contractors and their supply chains. Discover how ratings, real‑time supply‑chain detection and response (SCDR), and MAX help prepare for audits and sustain continuous compliance.
More Details -
BlogProactive TPRM: How To Automate Vendor Risk Management with SecurityScorecard and ServiceNow
December 5, 2025Learn how the ServiceNow and SecurityScorecard integration automates Third-Party Risk Management (TPRM) with real-time breach intelligence.
More Details -
BlogWhat is Lateral Movement in Cybersecurity?
November 4, 2025Learn about lateral movement and how cyber attackers use it to move deeper into networks, access sensitive data, and how to detect and stop them.
More Details -
BlogWhat Is HTTPS and Why Is It Essential for Cybersecurity?
November 25, 2025What Is HTTPS? Learn about secure web protocols, SSL certificates, encryption best practices, and emerging cybersecurity threats.
More Details -
BlogWhat is a Prompt Injection Attack: What CISOs Need to Know
November 11, 2025What is a prompt injection attack? Learn how this AI security threat manipulates language models, real examples, and strategies to protect your systems.
More Details -
WebinarThe Silent Spies Hiding in Thousands of Devices: Operation WrtHug
The STRIKE Threat Intelligence team at SecurityScorecard has just unveiled a new research report on a sweeping espionage operation weaponizing home routers into a global spying operation.
More Details -
WebinarA Security Assessment of Key Indian Suppliers: Third-Party Cyber Risks to Global Supply Chains
Over half (52.6%) of Indian vendors experienced a third-party breach in the last year, a signal that India’s globally embedded vendor ecosystem is both a powerhouse and a prime target.
More Details -
WebinarCyber Risk Compliance Reimagined: Preparing for the UK Cyber Security and Resilience Bill
With 98% of the UK’s top companies linked to a breached vendor, and new requirements on supply chain assessments, breach disclosures, and critical supplier oversight, cybersecurity compliance is no longer optional, it is operational.
More Details -
BlogHow Executive Order 14028 Is Strengthening Supply Chain Cybersecurity for the Public and Private Sector
December 23, 2025Executive Order 14028 emphasizes Zero Trust, cloud adoption, and improved threat sharing across agencies and vendors. Learn how this EO reshapes supply chain defense and how SecurityScorecard supports continuous monitoring and risk intelligence.
More Details
