Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
WebinarThe Silent Spies Hiding in Thousands of Devices: Operation WrtHug
The STRIKE Threat Intelligence team at SecurityScorecard has just unveiled a new research report on a sweeping espionage operation weaponizing home routers into a global spying operation.
More Details -
WebinarA Security Assessment of Key Indian Suppliers: Third-Party Cyber Risks to Global Supply Chains
Over half (52.6%) of Indian vendors experienced a third-party breach in the last year, a signal that India’s globally embedded vendor ecosystem is both a powerhouse and a prime target.
More Details -
WebinarCyber Risk Compliance Reimagined: Preparing for the UK Cyber Security and Resilience Bill
With 98% of the UK’s top companies linked to a breached vendor, and new requirements on supply chain assessments, breach disclosures, and critical supplier oversight, cybersecurity compliance is no longer optional, it is operational.
More Details -
ResearchHow to Prepare for Hong Kong’s Protection of Critical Infrastructure Bill in 2026
January 20, 2026Hong Kong’s Protection of Critical Infrastructures Bill, effective January 1, 2026, introduces a comprehensive cybersecurity framework to safeguard essential services and strengthen national resilience. The legislation mandates operator-level accountability for both internal systems and external dependencies, including cloud platforms, managed services, and third-party vendors. Non-compliance carries severe financial penalties, emphasizing the need for structured governance and continuous oversight.
More Details -
BlogCyber Resilience in 2026: Why Supply Chains Are the New Front Line
January 21, 2026The World Economic Forum’s Global Cybersecurity Outlook 2026 delivers a clear message for leaders across government and industry: cyber risk no longer lives inside the firewall.
More Details -
BlogWhat is SOX Compliance?
January 13, 2026Discover how SOX compliance protects financial reporting through internal controls, audits, and cybersecurity measures for public companies.
More Details -
BlogWhat Is Data Leakage
January 6, 2026Data leakage occurs when sensitive information escapes an organization's control, whether due to employee mistakes, software vulnerabilities, or intentional theft.
More Details -
BlogWhat is API Security?
December 30, 2025Learn what API security is, common vulnerabilities like broken authentication, and essential techniques to protect your APIs from evolving threats.
More Details -
BlogCritical Update: What Security Leaders Need to Know Right Now About the Future of CISA and Threat Sharing
January 23, 2026Discover how the expiration of the Cybersecurity Information Sharing Act (CISA 2015) disrupted threat intelligence, weakened national security, and widened AI-driven attack gaps. SecurityScorecard’s Mike Centrella and Dr. Aleksandr Yampolskiy explain what’s at stake as the January 2026 deadline nears amid a potential government shutdown.
More Details -
BlogWhat Is Malware: Definition and Examples
December 16, 2025What is malware? Learn how malicious software infiltrates networks, the types of threats your organization faces, and proven defenses to protect your business.
More Details -
BlogWhat is a CVE and Why is It Important?
November 17, 2026What is a CVE? This guide explains how security teams use Common Vulnerabilities and Exposures to identify, track, and prioritize the threats that matter most.
More Details -
BlogWhat is 5G Network Security?
November 4, 2025Learn what 5G security means for your organization. Discover the key risks, architecture vulnerabilities, and how to protect your vendor ecosystem.
More Details