Resources

Cybersecurity white papers, data sheets, webinars, videos and more

Resource Library

Clear filters

Women in Cybersecurity Panel Event RSAC 2026 

April 2, 2026

Women in Cybersecurity Panel Event RSAC 2026 
Learn more in this resource.
Cyber Risk Compliance Reimagined: Preparing for the UK Cyber Security and Resilience Bill

December 12, 2025

Cyber Risk Compliance Reimagined: Preparing for the UK Cyber Security and Resilience Bill
With 98% of the UK’s top companies linked to a breached vendor, and new requirements on supply chain assessments, breach disclosures, and critical supplier oversight, cybersecurity compliance is no longer optional, it is operational.\r\n
A Security Assessment of Key Indian Suppliers: Third-Party Cyber Risks to Global Supply Chains

December 12, 2025

A Security Assessment of Key Indian Suppliers: Third-Party Cyber Risks to Global Supply Chains
Over half (52.6%) of Indian vendors experienced a third-party breach in the last year, a signal that India’s globally embedded vendor ecosystem is both a powerhouse and a prime target.\r\n
The Silent Spies Hiding in Thousands of Devices: Operation WrtHug

December 12, 2025

The Silent Spies Hiding in Thousands of Devices: Operation WrtHug
The STRIKE Threat Intelligence team at SecurityScorecard has just unveiled a new research report on a sweeping espionage operation weaponizing home routers into a global spying operation.\r\n
From Checkbox Compliance to Active Defense: Mastering the Supply Chain Cybersecurity Maturity Curve

November 18, 2025

From Checkbox Compliance to Active Defense: Mastering the Supply Chain Cybersecurity Maturity Curve
Learn more in this resource.
AI-Powered Third-Party Risk Management: Go Beyond the Score

November 13, 2025

AI-Powered Third-Party Risk Management: Go Beyond the Score
What if you could harness the power of AI to transform your third-party risk management program? In today’s complex supply chain risk environment, managing cyber risk is no longer just about receiving a single security rating and traditional vendor assessments. Manual processes leave security teams spending countless hours gathering data and chasing down responses. This time-consuming, reactive approach leaves you vulnerable and unable to focus on the most critical threats. You need a smarter, more efficient way that provides deeper, proactive insights, such as industry benchmarking for vendors and automating workflows to prioritize the highest-risk issues.
Adversarial AI: The New Symmetric Threat Landscape

October 30, 2025

Adversarial AI: The New Symmetric Threat Landscape
Adversarial AI is geometrically making cyber a symmetric threat, fundamentally altering the cybersecurity equation.
Beyond Prevention: Why Your Supply Chain Requires Real-Time Incident Response

July 9, 2025

Beyond Prevention: Why Your Supply Chain Requires Real-Time Incident Response
This webinar explores the critical findings from our 2025 Supply Chain Cybersecurity Trends report.
MAX
Threat-Informed TPRM
DORA, NIS2 : Maîtriser les risques cyber liés aux tiers

June 26, 2025

DORA, NIS2 : Maîtriser les risques cyber liés aux tiers
Au-delà d’un simple impératif de conformité ponctuel, les directives DORA et NIS2 établissent de nouvelles références réglementaires visant à garantir une résilience cyber sur le long terme.
DORA
NIS2
Fortifying Your Supply Chain: The ROI of Managed Supply Chain Detection and Response

June 18, 2025

Fortifying Your Supply Chain: The ROI of Managed Supply Chain Detection and Response
Join us to discover how a managed Supply Chain Detection and Response (SCDR) service, like SecurityScorecard MAX, transforms your approach to vendor risk.
MAX
Threat-Informed TPRM
A CISO’s Guide to Mastering Cyber Incident Response: Are Your Vendors Your Weakest Link?

June 3, 2025

A CISO’s Guide to Mastering Cyber Incident Response: Are Your Vendors Your Weakest Link?
Learn more in this resource.
MAX
Threat-Informed TPRM
Turning Data into Action: Key Findings from the 2025 Global Third-Party Breach Report

May 14, 2025

Turning Data into Action: Key Findings from the 2025 Global Third-Party Breach Report
Learn more in this resource.
MAX
Threat-Informed TPRM
Navigating Supply Chain Cyber Hygiene: DORA & NIS2 in the Spotlight

April 24, 2025

Navigating Supply Chain Cyber Hygiene: DORA & NIS2 in the Spotlight
Learn more in this resource.
Navigating Systemic Risks: Strengthening Third-Party & Supply Chain Resilience

April 16, 2025

Navigating Systemic Risks: Strengthening Third-Party & Supply Chain Resilience
Learn more in this resource.
CPE | Cyber Risk Quantification: Measuring and Managing the Unseen Threats

March 12, 2025

CPE | Cyber Risk Quantification: Measuring and Managing the Unseen Threats
Learn more in this resource.
Strengthening Vendor Relationships and Building Cyber Resilience

February 28, 2025

Strengthening Vendor Relationships and Building Cyber Resilience
Learn more in this resource.
Threat-Informed TPRM
The Philanthropist’s Take: Bolstering Cyber Civil Defense

February 20, 2025

The Philanthropist’s Take: Bolstering Cyber Civil Defense
Learn more in this resource.
Breaking Silos with SCDR: How SOCs & TPRM Teams Drive Integrated Cyber Strategies

February 11, 2025

Breaking Silos with SCDR: How SOCs & TPRM Teams Drive Integrated Cyber Strategies
Learn more in this resource.
Threat-Informed TPRM
The CEO’s Take: Bridging the Cybersecurity Divide To Address Cyber Risk

February 4, 2025

The CEO’s Take: Bridging the Cybersecurity Divide To Address Cyber Risk
Learn more in this resource.
Building a High-Performing Supply Chain Incident Response Team

January 28, 2025

Building a High-Performing Supply Chain Incident Response Team
Supply chain security is no longer an afterthought. With increasing threats and the potential for devastating consequences, organizations must proactively address supply chain risks. In this webinar, we will discuss how a well-structured supply chain incident response team can address these challenges and mitigate risks.
Threat-Informed TPRM
The CISO’s Take: Securing the Future of Financial Services & More

January 23, 2025

The CISO’s Take: Securing the Future of Financial Services & More
Learn more in this resource.