![](https://securityscorecard.com/wp-content/uploads/2024/06/SSC_Updated_Resources-17-scaled.webp)
Our Latest Resources
Explore our cybersecurity white papers, data sheets, webinars, videos and more.
-
Webinar
Strengthening Vendor Relationships and Building Cyber Resilience
February 28, 2025More DetailsSCDR -
Learning Center
What is the Difference Between Information Security vs Cybersecurity?
February 13, 2025Information security and cybersecurity are often used interchangeably; however, they both address different kinds of security. Learn more.
More DetailsTech Center -
Learning Center
What is IT Risk Management? A Complete Guide
February 13, 2025More DetailsTech Center -
Blog, Learning Center
The Ultimate Data Breach Response Plan
February 13, 2025In a hyper-connected world, data breaches continue to increase in size and scope. To bolster your cybersecurity posture, you should put together a data breach response plan as a way to prepare your organization.
More DetailsServices, Tech Center -
Learning Center
What’s Wrong with Two-Factor Authentication?
February 13, 2025Though requiring an extra identifier does deter some hackers from attacking systems defended with two-factor authentication, it is not always your safest option. Find out more on SecurityScorecard's blog.
More DetailsTech Center -
Learning Center
How Can You Secure Risky Open Ports?
February 13, 2025Open network ports enable organizations to adopt cloud strategies. However, each port is technically a small gateway into an organization’s IT stack. Learn how you can security risky open ports.
More DetailsTech Center -
Learning Center
The Role of Cybersecurity in Enterprise Risk Management (ERM)
February 13, 2025An enterprise risk management program should include a cybersecurity element so organizations can identify relationships between risk and impact across its ecosystem.
More DetailsTech Center -
Blog, Learning Center
Vendor Risk Assessment Template
February 13, 2025You can’t completely eliminate vendor risk, but you can manage it. Learn how to create a vendor risk assessment template with SecurityScorecard.
More DetailsTech Center -
Research
Lazarus Group is Infecting Open-Source Code. Are You at Risk?
February 13, 2025North Korea’s Lazarus Group is hiding malware inside GitHub repositories and NPM packages, compromising developers and cryptocurrency platforms. Their targets: your code, your wallets, your users.
More DetailsSTRIKE Team -
Blog
Lazarus Group Targets Developers Through NPM Packages and Supply Chain Attacks
February 13, 2025North Korea’s Lazarus Group is evolving its tactics again. The latest campaign, dubbed Operation Marstech Mayhem, introduces an advanced implant named "Marstech1."
More DetailsSTRIKE Team -
Blog
A Deep Peek at DeepSeek
February 10, 2025DeepSeek’s rapid ascent in the AI space has made it impossible to ignore. Its sophisticated models and AI assistant have captured global attention. And, while headlines focus on DeepSeek’s capabilities, STRIKE research exposes critical security flaws, hidden data flows, and unanswered questions about who has access to the data and why.
More DetailsSTRIKE Team -
Press
SecurityScorecard Reaffirms FedRAMP and Achieves StateRAMP Ready Status
February 10, 2025U.S. federal, state and local agencies to adopt SecurityScorecard SCDR to secure supply chains with confidence
More Details