Product News

Find out about our new product features, the latest platform changes, and discover company announcements before anyone else.

Risk Management

Stay up to date on third-party risk management best practices and techniques, and learn about new regulations for third party risk.

Security Research

Keep up with research around the biggest data breaches, malware infections, IoT risks and all the latest news in cybersecurity.

How Big is the End-Of-Life Cybersecurity Problem? [INFOGRAPHIC]

  End-of-Service or End-Of-Life (EOL), is a term applied to hardware or software when a manufacturer stops supporting it with any updates. This can be very problematic since any vulnerabilities that are found (and can subsequently be exploited by hackers) will never be patched. This can cause widespread damage if a software, such as an operating … Continued

Announcing the Security Roundup Newsletter

Announcing the Security Roundup Newsletter

Introducing the Security Roundup Newsletter. The Security Roundup is our weekly curated newsletter made up of the most interesting and important developments in the cybersecurity space. Our Director of Architecture, Sean Smith, provides his research and analysis on content scoured across the web, ranging from new developments on a strain of ransomware, how Google is … Continued

Read More
How Big Is the U.S. Government Cybersecurity Problem?

How Big Is the U.S. Government Cybersecurity Problem?

A look at recent data breaches and how the government is reacting. It seems like the US government is more and more often falling prey to hackers, whether it’s from nation-sponsored organizations or independent organizations. Two government data breaches made the list of Network World’s list of ‘Biggest data breaches of 2015’ citing an IRS … Continued

Read More
Why A Holistic View Is Key To Accurate Security Ratings

Why A Holistic View Is Key To Accurate Security Ratings

SecurityScorecard’s co-founders, former CISOs, were struggling with the fact that they were able to understand their own security posture but didn’t have that same confidence when it came to determining an accurate security rating for their partners and vendors. They created SecurityScorecard to fill the gap in the market. The use of third-party cloud-based companies … Continued

Read More
The Healthcare Industry Currently Faces A Growing Cyber Security Crisis

The Healthcare Industry Currently Faces A Growing Cyber Security Crisis

  Hospitals are where you go to get healthy, but they are increasingly becoming playgrounds for hackers, owing to weak cyber security measures. A couple of weeks ago, networks of the Hollywood Presbyterian Medical Center, a California-based hospital, were held hostage, reportedly to the tune of 9,000 bitcoin or over $3.6 million. This isn’t a … Continued

Read More
A Security Analysis of ​the VTech Data Exposure

A Security Analysis of ​the VTech Data Exposure

Hacker Goes Directly to Media to Expose VTech Security Issues The Hong Kong-based toy company, VTech, recently experienced a data breach that exposed the customer data of 6.2 million children and 4.9 million adults across 13 different countries, with the bulk from the U.S.. VTech has a number of electronic toys, some which are using … Continued

Read More
Hilton and Starwood Data Breaches Spotlight Retail Malware

Hilton and Starwood Data Breaches Spotlight Retail Malware

Point of Sale Malware at Retail Stores Inside Hilton & Starwood Hotels The last few weeks have seen several major hotel chains including Starwood Hotels and Hilton Hotels report data breaches targeting the credit card data used at retail outlets inside the hotels. In both cases, Point of Sale (PoS) malware was the attack culprit. … Continued

Read More
An Analysis of the Pearson VUE Data Breach

An Analysis of the Pearson VUE Data Breach

Cisco Shuts Down Cert Tracker After Pearson Breach A third party technology examination company, Pearson VUE, was recently a victim of a malware attack that has exposed personal user data and passwords, according to Network Computing. Pearson VUE is one of the largest handlers of technology exams for companies and organizations that test individuals for … Continued

Read More
The Holiday Shopping Season's Retail Security Reality

The Holiday Shopping Season’s Retail Security Reality

Ranking Retail Security: Web Applications & Legacy Systems Are Weak Black Friday and Cyber Monday are almost here. Earlier this week, we released our 2015 Retail & eCommerce Security Report that examines a variety of security risk trends and problem areas within the top and bottom 10% of retail companies which represent roughly 200 retail … Continued

Read More
Tips for Vetting the Security of Cloud Service Providers

Tips for Vetting the Security of Cloud Service Providers

How to Vet Cloud Vendors and Make Sure CSPs Are Used Securely A modern enterprise uses the cloud and cloud service providers (CSP), period. Your employees might use DropBox or OneDrive to access work data remotely. You might communicate with your vendors mostly through a portal that accepts invoices and generates work orders. At the top … Continued

Read More
New Research Calls Out Today's Vendor Risk Challenges

New Research Calls Out Today’s Vendor Risk Challenges

New ESG Report: “Intelligence-driven Vendor and Supplier Security Risk Management” A recent study conducted by Enterprise Strategy Group (ESG), an IT research and strategy firm based in Milford, MA, looks at the issue of third party supplier and partner security in depth. The new report discusses approaches to today’s vendor risk management challenges and emerging technology solutions … Continued

Read More
SecurityScorecard Honored to Be a Part of the SINET 16 Showcase

SecurityScorecard Honored to Be a Part of the SINET 16 Showcase

SecurityScorecard Wins Coveted Innovation Award SecurityScorecard was recently named a top 16 winner from SINET, the Security Innovation Network. SINET chose SecurityScorecard as one of the winners out of over a hundred security companies. SecurityScorecard is one of the youngest companies on the winning roster. Our CEO and Co-founder, Dr. Aleksandr Yampolskiy, is presenting today … Continued

Read More
How Shadow IT Complicates Vendor Risk Management

How Shadow IT Complicates Vendor Risk Management

Third Party Dangers in Shadow IT The shadow information technology (IT) services provided by unknown third-party vendors introduce multiple risks. Any time data is moved to a vendor or accessed outside the corporate network by a third- or fourth-party, the risk of loss increases. Companies have, in one sense, lost control of IT. A Forbes article reported … Continued

Read More
Third Parties a Major Culprit in Healthcare Breaches

Third Parties a Major Culprit in Healthcare Breaches

Healthcare Breaches Cannot Be Ignored There have been two notable healthcare breaches in the last month: Upstate New York healthcare provider, Excellus Blue Cross Blue Shield, recently reported over 10 million patients’ records were breached. Systema Software, a Larskpur, California-based third party claims software provider, had data of 1.5 million customer claims data exposed on … Continued

Read More
Use Vendor Risk Management Templates to Establish a Baseline

Use Vendor Risk Management Templates to Establish a Baseline

Level the Vendor Risk Playing Field With Templates Two facts have radically transformed vendor risk management and the need for template use in just the past few years:   There’s increased awareness that vendors are often the weak links that allow data breaches to occur; Federal regulators are increasingly vocal about the need for aggressive … Continued

Read More
How Strong Is Your Vendor Management Program?

How Strong Is Your Vendor Management Program?

Vendor Management: You Need a Strategy Like the game of chess, vendor management requires understanding all the moves of all the pieces of vendors themselves. The more vendors differ in what and how they supply your company, the more challenging your vendor management (VM) program will be. Vendor management processes for companies with minimal vendor diversity … Continued

Read More
A Closer Look at Experian’s Scorecard

A Closer Look at Experian’s Scorecard

T-Mobile & Experian: The Fallout From Big Brand Breaches Update: Class-action lawsuits for Experian are increasing, according to The Hill. Experian, who released half-year financials yesterday, was quoted as saying: “It is currently not possible to predict the scope and effect on the Group of these various regulatory and government investigations and legal actions, including their timing … Continued

Read More
The Target Breach: A Study in Vendor Risk Gaps

The Target Breach: A Study in Vendor Risk Gaps

Verizon Report to Target Reinforces Need for Instant Risk Visibility Target has become a case study in the long-term effects of security risk via a third party. A class action suit brought by banks, credit unions, and financial firms was recently approved by a Federal judge, so the legal costs are still being added up. The … Continued

Read More
The 10 Best & Worst College & University Security Rankings

The 10 Best & Worst College & University Security Rankings

A University Security Audit for 2015 Data breaches and data theft at colleges and universities are a very common occurrence. From the 80,000 students recently affected at California State colleges to the 29 employee records hacked at the University of Calgary last week in Canada, higher education is a frequently targeted playground for security attacks. This week, Rutgers University … Continued

Read More
Announcing the First Collaborative Security Risk Platform

Announcing the First Collaborative Security Risk Platform

Our Mission is to Empower Every Company with Collaborative Security Intelligence Today, we are proud to launch the first fully collaborative platform for closing the security loop with partners. Via the ‘Invite a Vendor’ function, customers can now directly share detailed Scorecard information with strategic partners, suppliers, and vendors. SecurityScorecard customers can speed up the … Continued

Read More
Addressing The Vendor Risk Management Dilemma

Addressing The Vendor Risk Management Dilemma

It has happened in retail, in hotels, in healthcare, and in many other verticals with many suppliers or partners. Exactly how has vendor risk management missed the mark so often? It has become an old story. A large company’s network is gravely breached and, after weeks of investigation, a finger is pointed at a minor … Continued

Read More
The Vendor Risk Checklist You Need Before Signing a Contract

The Vendor Risk Checklist You Need Before Signing a Contract

Validate Vendor Risk Management with a Security Checklist We’ve compiled a checklist of items that your company can use to protect its infrastructure whenever it starts working with a new vendor, as part of routine vendor risk management processes. A vendor’s systems can be a threat to you  when both parties’ systems are connected together. This … Continued

Read More
Why Supply Chains Need Strong Vendor Risk Management

Why Supply Chains Need Strong Vendor Risk Management

The New Attack Perimeter: Third-Party Suppliers As technology becomes more tightly integrated with traditional manufacturing processes, OEM components and capital equipment are vulnerable to intrusion. Ultimately, companies that rely on suppliers to secure their own products are falling behind the regulatory and reputational curve. Security is front of mind for government scrutiny and consumer awareness. … Continued

Read More
5 Tools Every Vendor Manager Should Know About

5 Tools Every Vendor Manager Should Know About

Vendor Management Is Evolving Into a More Complex and Risky Process When tasked with working in a modern technology-driven industry you will undoubtedly find that your company is not large enough to facilitate all the needs that your customers and employees require. This is true for almost any company now, and the easiest way to … Continued

Read More
Research Reflections from Black Hat 2015

Research Reflections from Black Hat 2015

Members of SecurityScorecard’s R&D Team Attended Black Hat USA 2015 The following post includes reflections and impressions from Black Hat USA 2015 by two security researchers, John Mullins and Greg Lindor, who work on SecurityScorecard’s Research & Development team.  This team is led by Head of Threat Intelligence, Marcello Duarte, who manages and advises a team … Continued

Read More
The Security of Mobile Apps Starts and Ends With Developers

The Security of Mobile Apps Starts and Ends With Developers

Third Party Development Adds to the App Security Dillema According to a story from Business Insider, mobile device users spend 86 percent of their time using mobile apps, as opposed to the mobile web. Businesses cite the rapid adoption of apps as a way to cut costs and increase productivity, but apps suffer from insecure … Continued

Read More
Security DNA Is the Foundation of SecurityScorecard

Security DNA Is the Foundation of SecurityScorecard

SecurityScorecard Expands Security Talent with New Hire Today, we announced the appointment of Steve Thomas as Director of Sales Engineering and Business Development. In this new position, Thomas will be responsible for applying his extensive technical security engineering background to help the company provide exceptional customer support services. Prior to joining SecurityScorecard, Thomas served as … Continued

Read More
Third-Party Security Breaches Sign of Growing Vendor Risk Problem

Third-Party Security Breaches Sign of Growing Vendor Risk Problem

Third Party Breaches Continue to Remain in the Media The long term effects of data breaches that have originated via third parties have the attention of executive boards of directors, but the C-level may not be as keen on dealing with the problem as you might think. These long term effects include: legal action from customers, damage … Continued

Read More
Echoes of Target Breach In Recent CVS Photo Partner Hack

Echoes of Target Breach In Recent CVS Photo Partner Hack

PNI Digital Media Was A Third Party Entry Point Into Big Retail: CVS, Walmart, Possibly Others Update: PNI Digital media is facing multiple class action lawsuits, according to Law 360 and Class Actions Reporter. One suit is centered on CVS in the state of Georgia; the other suit is focused on Costco which was filed … Continued

Read More
The Problem With Corporate Email Addresses on Social Networks

The Problem With Corporate Email Addresses on Social Networks

SecurityScorecard Finds Grainger Susceptible to Social Engineering In a July 14 press release, the B2B industrial distributor, W.W. Grainger reported that it had experienced a security attack. The company stated in this press release that there was “no evidence there is any impact to customers, suppliers or employees because there is no indication that information … Continued

Read More
Security Data Breaches Round Up: Higher Education

Security Data Breaches Round Up: Higher Education

Higher Education’s Records Are Key PII and Credential Theft Targets Where there is data to be harvested for fraud, there will be breaches. The question arises, why is a specific vertical industry more susceptible to breaches than others? The irony for the education vertical is that much of it comes down to security awareness and … Continued

Read More