Whitepapers
More in-depth information.
-
White Paper
Outcome-Driven Metrics for Supply Chain Cyber Risk Management
April 26, 2024Discover how to create outcome-driven metrics that allow CISOs to demonstrate the benefits of cybersecurity investment by measuring metrics against threats that could impact revenue.
More DetailsSupply Chain Cyber Risk -
White Paper
SecurityScorecard’s Scoring Methodology 3.0
April 9, 2024Take a deep dive into SecurityScorecard's scoring methodology.
More DetailsSecurity Ratings -
White Paper
Applying Machine Learning to Optimize the Correlation of SecurityScorecard Scores with Relative Likelihood of Breach
April 9, 2024SecurityScorecard ratings provide a means for objectively monitoring the cybersecurity hygiene of organizations (including their vendors) and gauging whether their security posture is improving or deteriorating over time.
More DetailsSecurity Ratings -
Research, White Paper
A technical analysis of the APT28’s backdoor called OCEANMAP
March 5, 2024Late last year, the Computer Emergency Response Team of Ukraine (CERT-UA) released an advisory that reported cyberattacks targeting state organizations attributed to the Russian espionage group APT28, aka Fancy Bear/Sofacy. The advisory listed the use of a new backdoor named “OCEANMAP.” Download this whitepaper to explore a technical analysis of APT28’s tactics, techniques, and procedures.
More DetailsVlad Pasca
Cyber Threat Intelligence, Enterprise Cyber Risk, Supply Chain Cyber Risk -
White Paper
Security Ratings: A New Horizon
January 9, 2024Unveiling a new Security Ratings methodology for Telecommunications, Internet Service Providers, and Cloud Providers
More DetailsAttack Surface Management, Cyber Threat Intelligence, Enterprise Cyber Risk, Security Ratings, Supply Chain Cyber Risk -
White Paper
Cactus Ransomware
October 20, 2023More DetailsAttack Surface Management, Cyber Insurance, Cyber Threat Intelligence, Enterprise Cyber Risk, Supply Chain Cyber Risk -
Research, White Paper
Expand Your Vendor Intelligence To Identify Active Threats
February 28, 2023Research by Ponemon Institute reports that 59% of survey respondents haveconfirmed that their organization has experienced a data breach caused byone of their third parties, with 54% of the incidents occurring in the past12 months. What is more alarming is that only 34% of organizations areconfident their suppliers would notify them of a breach that couldput their business at risk. As the global attack surface continuesto expand, it’s more important than ever to tighten and matureThird- Party Risk Management (TPRM) programs, alsoreferred to as Vendor Risk Management. Staying ahead ofweaponized vulnerabilities and threat actors targetingyour vendors’ assets decreases the chances of acyber disruption to your organization.
More DetailsAttack Surface Management, Cyber Threat Intelligence, Enterprise Cyber Risk, Security Ratings, Supply Chain Cyber Risk -
White Paper
A Look Under The Hood: Data Powering Attack Surface Intelligence
November 10, 2022In this white paper, understand how we collect the data that powers Attack Surface Intelligence and the tools we use.
More DetailsAttack Surface Management -
Research, White Paper
A Detailed Analysis Of The Quantum Ransomware
September 14, 2022More DetailsAttack Surface Management, Cyber Insurance, Cyber Threat Intelligence, Enterprise Cyber Risk, Security Ratings, Supply Chain Cyber Risk -
Research, White Paper
How To Increase The Value Of Your GRC Platform With Risk Identification And Quantification
July 12, 2022More DetailsAttack Surface Management, Enterprise Cyber Risk, Security Ratings, Supply Chain Cyber Risk -
White Paper
How To Manage Third-Party Digital Risk
January 6, 2021Addressing data breaches outside your company is vital to managing your third-party digital risk. Download this white paper and learn about the implication of third-party data leaks, how to prevent and manage data leaks, and more.
More DetailsAttack Surface Management, Enterprise Cyber Risk, Security Ratings, Supply Chain Cyber Risk