Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
BlogHow Exposed OpenClaw Deployments Turn Agentic AI Into an Attack Surface
February 11, 2026SecurityScorecard’s STRIKE Threat Intelligence team details new research on exposed OpenClaw agentic AI deployments, explaining how attackers can abuse them for remote code execution and infrastructure misuse. STRIKE also shared steps organizations can take to reduce exposure.
More Details -
Blog, Research, STRIKEBeyond the Hype: Moltbot’s Real Risk Is Exposed Infrastructure, Not AI Superintelligence
February 9, 2026While the world debates Moltbook's role in the AI ecosystem, it is just the tip of the iceberg of Titanic risk. SecurityScorecard's STRIKE team uncovered what lurks beneath: Thousands of exposed OpenClaw (Moltbot) control panels vulnerable to takeover through misconfigured access and known exploits.
More DetailsSTRIKE Team -
BlogStrengthening National Cyber Resilience: Reflections from My Fireside Chat with ONCD Director Sean Cairncross
February 9, 2026Mike Centrella, SecurityScorecard Head of Public Policy, shares insights from his fireside chat with the National Cyber Director Sean Cairncross on strengthening U.S. cyber resilience, deterrence, AI security, and workforce strategy.
More DetailsMichael Centrella
-
Learning CenterWhat is an Information Security Policy and What Should it Include?
February 3, 2026More DetailsTech Center -
Learning CenterWhat is Access Control? Components and Types
February 3, 2026Digital transformation changes the perimeter. When organizations had all their applications on-premises, the network firewall kept the right users inside the gate and malicious actors outside. However, the move to the cloud changed all that. In today’s hyper-connected ecosystem, understanding the components and types of access control can help you strengthen security.
More DetailsTech Center -
BlogOdyssey 2026 Recap: Building Continuous Supply Chain Resilience in an Era of Persistent Threats
February 3, 2026SecurityScorecard’s Odyssey 2026 customer conference in Miami brought CISOs together to examine continuous, threat-informed supply chain security and the shift from periodic assessments to real-time risk operations.
More Details -
Blog, STRIKEWhat Are Moltbot and Moltbook and What Happens When Agentic AI Assistants Scale Without Security
February 3, 2026Moltbot AI assistants and their social media platform Moltbook have sparked AGI fears in recent days, but the real risk is access. Learn what Moltbook and Moltbot are (now OpenClaw and formerly known as Clawdbot), why it’s not artificial general intelligence (AGI), and how to reduce security exposure.
More Details -
Learning CenterWhat is OSINT and How Is It Used in Cybersecurity?
January 22, 2026Learn what open source intelligence (OSINT) is, how it supports cybersecurity operations, and the tools used by analysts and attackers alike.
More Details -
Learning CenterWhat Exactly is the Dark Web?
January 20, 2026At its core, the dark web is a part of the internet that is not indexed by traditional search engines like Google.
More DetailsTech Center -
BlogHow Executive Order 14028 Is Strengthening Supply Chain Cybersecurity for the Public and Private Sector
January 20, 2026Executive Order 14028 emphasizes Zero Trust, cloud adoption, and improved threat sharing across agencies and vendors. Learn how this EO reshapes supply chain defense and how SecurityScorecard supports continuous monitoring and risk intelligence.
More Details -
Learning Center10 Common Cyber Attack Vectors and How to Avoid Them
January 6, 2026When it comes to cybercrime, cybercriminals are constantly changing their tactics. Think back to 10 years ago; malware sites — malicious sites that attempt to install malware on a device – were a common attack vector. At the same time, sophisticated ransomware attacks on organizations were rare. Often, ransomware was used to target individuals, sometimes blackmailing them for having been on unsavory sites and asking for a few hundred dollars in ransom.
More DetailsTech Center -
Learning CenterHow Does an Intrusion Detection System (IDS) Work?
December 23, 2025Learn how Intrusion Detection Systems (IDS) work, explore different types, and discover best practices for integrating IDS into your security stack.
More Details