The Forrester Wave™: Cybersecurity Risk Ratings Platforms, Q2 2024
Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Research
The Increase in Ransomware Attacks on Local Governments
What makes organizations in the public sector vulnerable to ransomware?
More DetailsDr. Robert Ames, Staff Threat Researcher
Public Sector -
Learning Center
SecurityScorecard 10 Risk Factors Explained
Trust begins with transparency. Check out SecurityScorecard’s ten risk factors, which are explained in an easy-to-understand manner that enables business and IT leaders to create meaningful conversations around cybersecurity risk and compliance.
More DetailsTech Center -
Press
SecurityScorecard and Industry Leaders Deliver Industry-Specific Security Ratings for Telecommunications, Internet Service Providers, and Cloud Providers
SecurityScorecard today announced the industry’s first security ratings developed exclusively for telecommunications, internet service providers, and cloud providers. Through close collaboration with industry leaders, SecurityScorecard sets a new standard for cybersecurity across these critical sectors.
More DetailsSecurity Ratings -
Research
SecurityScorecard Validation Assessment Summary
Online found SecurityScorecard’s footprinting to be very accurate. Over the course of testing Online evaluated SecurityScorecard’s data for a total of 13 unique, unrelated, and randomly selected domains and found SecurityScorecard’s attribution process to have an accuracy of 95%. The accuracy for positively attributing IP Addresses was found to be 94% while for DNS Records it was found to be 100%.
More DetailsVlad Pasca
-
White Paper
DORA and Cyber Risk: A New Framework for Third-Party Risk in the European Union
DORA is an effort to build resilience within the financial service sector by requiring financial services organizations to establish and monitor networks of trust amongst themselves and their ICT vendors. However, trust requires verification through monitoring and transparency.
More DetailsVlad Pasca
Attack Surface Management, Cyber Threat Intelligence, Enterprise Cyber Risk, Security Ratings, Supply Chain Cyber Risk -
Ebook
Evolve from Risk Management to Risk Intelligence
Proven Strategies to Drive a Risk Intelligence Program in Your Organization
More Details -
Research
Volt Typhoon Compromises 30% of Cisco RV320/325 Devices in 37 Days
The SecurityScorecard Threat Research, Intelligence, Knowledge, and Engagement (STRIKE) Team has identified new infrastructure that appears to be linked to the threat actor group tracked as Volt Typhoon. Volt Typhoon is a state-sponsored group based in China that typically focuses on espionage and information gathering. Approximately 30% of the Cisco RV320/325 devices observed by SecurityScorecard in a 37-day period may have been compromised by Volt Typhoon.
More DetailsCyber Threat Intelligence -
Ebook
CISO Action Plan
A challenge exists in modern organizations: to improve the quality and effectiveness of formal and informal communications between the Chief Information Security Officer (CISO) and other senior executives, including the C-suite and board members. This ebook presents action plans to help CISOs and senior executives find common ground.
More Details -
Research
Microsoft ProxyNotShell Zero Days
Prepared by: Rob Ames, Staff Threat Researcher, Jared M. Smith, Ph.D., Senior Director of Threat Research, Ryan Sherstobitoff, SVP of Threat Intelligence
More Details -
Research
Cyber Risk Intelligence: County Government Cyber Incident May Have Involved Social Engineering and Targeting of Vulnerable SSH Services
More DetailsDr. Rob Ames, Staff Threat Researcher
Cyber Threat Intelligence, Public Sector -
Research
Daixin Team Ransomware Group Claimed Airline Ransomware Attack
More DetailsCyber Threat Intelligence, Public Sector