The Forrester Wave™: Cybersecurity Risk Ratings Platforms, Q2 2024
SecurityScorecard Blog
Read the latest blog posts published weekly.
-
Blog, Learning Center
10 Examples of Recent and Impactful Ransomware Attacks
February 24, 2021With the cost of ransomware attacks growing, organizations must remain aware of the different ransomware variants used to compromise systems. Learn more about key ransomware threats
More DetailsCyber Threat Intelligence, Tech Center -
Blog, Learning Center
Healthcare IT Security and Compliance: A Complete Guide
August 26, 2020IT security and compliance are key for the healthcare industry as the adoption of web-based technologies and medical devices brings on new risks. Learn more.
More DetailsServices, Tech Center -
Blog
Calculating the ROI of Security Ratings.
August 24, 2020It can be difficult to show leadership metrics that prove that you’re saving money because of incidents that haven’t happened. Fortunately, there are a number of qualitative ways to prove to your board and investors that your investment in security ratings is saving your paying off.
More DetailsSecurity Ratings -
Blog, Learning Center
What Is a Cybersecurity Audit and Why Does it Matter?
August 17, 2020As organizations adopt new digital technologies, their risk of being targeted in cyberattacks grows. The increased network complexity that comes as a result of digital innovation often creates new network gaps for cyber adversaries to exploit. If left unchecked, these risks can undermine organizational objectives which is why it is critical that businesses have effective cybersecurity programs in place. A key component to the success of these programs is the administration of cybersecurity audits.
More DetailsTech Center -
Blog, Learning Center
What is a Third-Party Vendor? Tips for Managing Vendor Risk
July 23, 2020A third-party vendor is any company or entity with a direct written contract to provide goods or services to your customers on your behalf. Explore 3 best practices for third-party risk management.
More DetailsAttack Surface Management, Tech Center -
Blog, Learning Center
The CISO’s Guide to Reporting Cybersecurity to the Board
April 6, 2020Being able to effectively report on cybersecurity is a key component to every CISOs job. Learn how CISOs can ensure that their board presentations are beneficial.
More DetailsTech Center -
Blog, Learning Center
What is Cyber Threat Intelligence? A Complete Guide
March 12, 2020Continued cyber threat intelligence monitoring has become imperative to business success. Learn more about cyber threat intelligence and its various use cases.
More DetailsCyber Threat Intelligence, Tech Center -
Blog, Learning Center
4 Ways to Optimize Your Third Party Cyber Risk Management (TPCRM) Program
January 6, 2020Managing your TPCRM program can be a tedious, time-consuming task, yet it is a critical one. Learn 4 ways to optimize your TPCRM program.
More DetailsSupply Chain Cyber Risk, Tech Center -
Blog, Learning Center
Vendor Risk Assessment Template
June 18, 2019You can’t completely eliminate vendor risk, but you can manage it. Learn how to create a vendor risk assessment template with SecurityScorecard.
More DetailsTech Center -
Blog
A Shared Language to Improve Ecosystem Cybersecurity Risks
August 7, 2018Security professionals need to find a way to bridge the knowledge and skills gap by creating a shared vocabulary that fosters cybersecurity improvements across an entire ecosystem of organizations.
More DetailsCyber Threat Intelligence -
Blog
The Ultimate Vendor Risk Management Checklist
May 9, 2018Digital transformation increases the number of vendors that your organization incorporates into its IT ecosystem. Check out these 15 rules that you can use as a vendor risk management checklist.
More DetailsAttack Surface Management, Tech Center -
Blog
Odyssey.conf 2024: Navigating the Future of Supply Chain Cybersecurity with SecurityScorecard
Key takeaways from Odyssey.conf 2024 with insights on cybersecurity leadership, innovative risk management, and the future of AI in security.
More DetailsJason Thompson
Executive Viewpoint