Product News

Find out about our new product features, the latest platform changes, and discover company announcements before anyone else.

Risk Management

Stay up to date on third-party risk management best practices and techniques, and learn about new regulations for third party risk.

Security Research

Keep up with research around the biggest data breaches, malware infections, IoT risks and all the latest news in cybersecurity.

Release Notice: New Vendor Collaboration Enhancements Accelerates Path to Remediation and Improved Ratings

Release Notice: New Vendor Collaboration Enhancements Accelerates Path to Remediation and [...]

SecurityScorecard strives to make vendor collaboration easy and accessible. Our latest release strengthens the vendor collaboration process by:   Setting clear expectations between customers and their vendors with regard to security issue remediation;   Empowering customers by increasing transparency over the engagement level of their vendors in improving their security; Providing vendors with enhanced clarity … Continued

Read More
A CISO’s Guide to Communicating with the Board

A CISO’s Guide to Communicating with the Board

Communicating with the Board of Directors can be one of the most difficult tasks that a Chief Information Security Officer is responsible for. Whether it’s because of differing priorities, a lack of clear information, or simple indifference, a CISO can have trouble getting the Board on the same page if he or she is not … Continued

Read More
WannaCry: The Global Attack with a Reminder Attached

WannaCry: The Global Attack with a Reminder Attached

  Last week a ransomware attack, unprecedented in size hit companies and organizations across the globe. As the world returns to the office today, the attack is poised to spread as unpatched machines are flipped on as people get back to work. Over the weekend, the SecurityScorecard research team completed a global scan using the … Continued

Read More
What is the Equation Group & who are the Shadow Brokers?

What is the Equation Group & who are the Shadow Brokers?

A massive ransomware attack has hit companies and organizations in over 99 countries causing tremendous business and civil disruption. The attack appears to stem from the use of stolen hacking tools that have been published by a group called the Shadow Brokers. The ransomware attacks appear to be the latest fallout relating to the EquationGroup … Continued

Read More
Top 10 Information Security Websites You Have to Follow

Top 10 Information Security Websites You Have to Follow

You’re a CISO on the train on your way into work. What are you reading? We all know that the information security world is constantly evolving, making it increasingly important to keep up with the latest threat, breach, or vulnerability that may be exposing risk to your organization. There are many security publications, sites, and … Continued

Read More
Top 12 Information Security Twitter Accounts You Have to Follow

Top 12 Information Security Twitter Accounts You Have to Follow

The information security industry moves at an incredibly quick pace, and sometimes it’s difficult to keep up with the the most recent updates, hacks, and data leaks that pose a threat to your organization. Social media is an excellent and quick way to ensure that you’re continuously informed on the latest security threat what’s most … Continued

Read More
Why are typosquats a risk to your organization?

Why are typosquats a risk to your organization?

  SecurityScorecard CEO, Aleksander Yampolskiy, recently did a presentation on the dangers of typosquats and how they can impact your organization. Keep reading to learn more about typosquats and how you can combat them. What are typosquats? Typosquatting, also called URL hijacking, is when an attacker targets a brand and registers a domain relying on typographical errors. … Continued

Read More