Introducing MAX — Take supply chain cyber risk management to the MAX
Whitepapers
More in-depth information.
- White Paper
SecurityScorecard’s Scoring Methodology 3.0
April 9, 2024Take a deep dive into SecurityScorecard's scoring methodology.
More DetailsSecurity Ratings - White Paper
Applying Machine Learning to Optimize the Correlation of SecurityScorecard Scores with Relative Likelihood of Breach
April 9, 2024SecurityScorecard ratings provide a means for objectively monitoring the cybersecurity hygiene of organizations (including their vendors) and gauging whether their security posture is improving or deteriorating over time.
More DetailsSecurity Ratings - Research, White Paper
A technical analysis of the APT28’s backdoor called OCEANMAP
March 5, 2024Late last year, the Computer Emergency Response Team of Ukraine (CERT-UA) released an advisory that reported cyberattacks targeting state organizations attributed to the Russian espionage group APT28, aka Fancy Bear/Sofacy. The advisory listed the use of a new backdoor named “OCEANMAP.” Download this whitepaper to explore a technical analysis of APT28’s tactics, techniques, and procedures.
More DetailsVlad Pasca
- White Paper
Security Ratings: A New Horizon
January 9, 2024Unveiling a new Security Ratings methodology for Telecommunications, Internet Service Providers, and Cloud Providers
More Details - Research, White Paper
Expand Your Vendor Intelligence To Identify Active Threats
February 28, 2023Research by Ponemon Institute reports that 59% of survey respondents haveconfirmed that their organization has experienced a data breach caused byone of their third parties, with 54% of the incidents occurring in the past12 months. What is more alarming is that only 34% of organizations areconfident their suppliers would notify them of a breach that couldput their business at risk. As the global attack surface continuesto expand, it’s more important than ever to tighten and matureThird- Party Risk Management (TPRM) programs, alsoreferred to as Vendor Risk Management. Staying ahead ofweaponized vulnerabilities and threat actors targetingyour vendors’ assets decreases the chances of acyber disruption to your organization.
More Details - White Paper
A Look Under The Hood: Data Powering Attack Surface Intelligence
November 10, 2022In this white paper, understand how we collect the data that powers Attack Surface Intelligence and the tools we use.
More Details - Research, White Paper
How To Increase The Value Of Your GRC Platform With Risk Identification And Quantification
July 12, 2022 More Details - White Paper
How To Manage Third-Party Digital Risk
January 6, 2021Addressing data breaches outside your company is vital to managing your third-party digital risk. Download this white paper and learn about the implication of third-party data leaks, how to prevent and manage data leaks, and more.
More Details - White Paper
Applying Machine Learning To Optimize The Correlation Of Securityscorecard Scores With Relative Likelihood Of Breach
October 15, 2020We conducted a study, investigating the use of Machine Learning (ML) to tune the weighting of each of the risk factors so that the total score is optimally correlated with the relative likelihood of incurring a data breach. Download the white paper to learn more.
More DetailsBob Sohval, PhD