SecurityScorecard Blog
Read the latest blog posts published weekly.
-
Blog
2025 Security Predictions: The Forces Reshaping Cybersecurity
November 25, 2024What worked in 2024 may not protect you in 2025. Our experts outline what to expect and highlight hidden vulnerabilities to address to keep your company safe from attackers here.
More DetailsExecutive Viewpoint, Supply Chain Cyber Risk, Third-Party Risk Management -
Blog, Learning Center
The Most Important Security Metrics to Maintain Compliance: Best Practices for Prioritizing Cyber Resilience
November 22, 2024Security metrics are a great way to ensure your organization is meeting industry standards. Here are a few key performance indicators to track for maintaining compliance.
More DetailsSecurity Ratings, Tech Center -
Blog
Scorecarder Spotlight: Fabio da Cruz Maciel
November 20, 2024Our series “Scorecarder Spotlight” showcases our talented employees and the incredible work they do. Meet Fabio da Cruz Maciel!
More Details -
Blog
A Day in the Life of a CISO – Addressing an Urgent Security Threat
November 18, 2024A Day in the Life of a CISO - Addressing an Urgent Security Threat
More Details -
Blog
A Day in the Life of a CISO – Presenting to the Board Chairman
November 18, 2024A Day in the Life of a CISO - Presenting to the Board Chairman
More Details -
Blog
Vendor Risk Management: Essential Strategies
November 18, 2024Learn how effective vendor risk management protects your business from cybersecurity threats, compliance failures, and operational disruptions.
More Details -
Blog
What Is Cyber Risk Management
November 18, 2024Learn what cyber risk management is and why it’s essential for protecting digital assets, reducing threats, and ensuring business resilience.
More Details -
Blog
The Botnet is Back: SSC STRIKE Team Uncovers a Renewed Cyber Threat
November 12, 2024Discover the resurgence of Volt Typhoon, a state-sponsored cyber-espionage group targeting the energy sector. Learn how they exploit legacy systems and outdated devices to embed themselves within critical infrastructure, posing a silent yet significant threat. Stay informed about the evolving tactics, global reach, and implications for national security.
More DetailsRyan Sherstobitoff, SVP, Threat Research & Intelligence
STRIKE Team -
Blog, Learning Center
What is the CIA Triad? Definition, Importance, & Examples
November 7, 2024More DetailsPrivate: Phoebe Fasulo
Tech Center -
Blog, Learning Center
Securing Port 139: Strategies to Prevent Unauthorized Access and Cyber Threats
November 7, 2024Discover how to secure Port 139 against cyber threats with SMB protocol security, preventing unauthorized access and ensuring network safety.
More DetailsTech Center -
Blog, Learning Center
SMB Port Numbers: A Guide to Optimizing and Securing Your Network
November 7, 2024Explore SMB port security and optimization for your network, including risks and best practices for safeguarding your digital infrastructure.
More DetailsTech Center -
Blog, Learning Center
Navigating the Risks of TCP 445: Strategies for Secure Network Communication
November 7, 2024Discover how to secure TCP 445 against cyber threats with our essential strategies for robust network communication and safety.
More DetailsTech Center