Product News

Find out about our new product features, the latest platform changes, and discover company announcements before anyone else.

Risk Management

Stay up to date on third-party risk management best practices and techniques, and learn about new regulations for third party risk.

Security Research

Keep up with research around the biggest data breaches, malware infections, IoT risks and all the latest news in cybersecurity.

IAPP Webinar Extended Q&A

IAPP Webinar Extended Q&A

For those of you who joined SecurityScorecard and our customer Allstate at the IAPP Webinar on Assuring Data Privacy and Security Compliance, we greatly appreciate the lively audience! We were happy to share some of our experiences in the information security space and even happier to hear the unique insights from Derek Morford and Adriana … Continued

Read More
An Overview of PCI DSS 3.2: Part 2

An Overview of PCI DSS 3.2: Part 2

Earlier today we wrote about the first half of the Payment Card Industry Data Security Standard (PCI DSS)-  a set of requirements dedicated to helping secure credit card data. If you haven’t had a chance to read that yet, click here. This post is dedicated to providing on overview on the second half of PCI … Continued

Read More
An Overview of PCI DSS 3.2: Part 1

An Overview of PCI DSS 3.2: Part 1

PCI compliance is a critical factor in the trustworthiness of your business when it comes to handling customers’ credit card information. While PCI compliance does not equal bulletproof security of credit card data, it does set a bar for companies who transmit, store, or process credit card data must meet. The Payment Card Industry Data … Continued

Read More
Employee Spotlight: A Look Inside SecurityScorecard

Employee Spotlight: A Look Inside SecurityScorecard

Recently, SecurityScorecard had the honor of receiving the Business Intelligence Group’s Best Place to Work award and being named CRN’s 10 Coolest Startups of 2017. Both these awards reflect the truly talented, enthusiastic, and inspiring employees who work here. We thought we’d dedicate a blog post to some of the people who make SecurityScorecard a … Continued

Read More
SecurityScorecard At Black Hat Event July 22-27

SecurityScorecard At Black Hat Event July 22-27

Black Hat is the world’s leading information security event, providing attendees with the very latest in research, development and trends. Black Hat USA 2017 kicks off with four days of technical Trainings (July 22-25) followed by the two-day main conference (July 26-27) featuring Briefings, Arsenal, Business Hall, and more. If you are one of the … Continued

Read More
FAQs about GDPR

FAQs about GDPR

  On May 25, 2018, the General Data Protection Regulation (GDPR) will go into effect, replacing the Data Protection Directive from 1995. This is the largest data protection legislation in the last 20 years. The new regulation addresses the export control of personal data of the European Union’s (EU) citizens and how businesses use this … Continued

Read More
SecurityScorecard Wins Best Place to Work Award

SecurityScorecard Wins Best Place to Work Award

SecurityScorecard Wins Best Place to Work Award   We are thrilled to receive the Business Intelligence Group’s (BIG) Best Places to Work award. This award is a tribute to the enthusiasm of the employees who work at SecurityScorecard. It affirms some of our efforts to create a positive work environment and pushes us to look … Continued

Read More
Cybersecurity Talent: The Problem and the Solution

Cybersecurity Talent: The Problem and the Solution

The rise in cybersecurity breaches tells us cybersecurity prevention efforts will remain important for the foreseeable future. Companies of all sizes and types are looking to spend on prevention efforts, specifically on hiring qualified cybersecurity specialists. So if the budgets are being allocated, the demand for cybersecurity talent is present, and the opportunities are available, … Continued

Read More
Petya Ransomware Attack: A Wake Up Call

Petya Ransomware Attack: A Wake Up Call

Just recently, we wrote about how in the aftermath of the WannaCry attack, companies should keep their guard up and be prepared for similar ransomware attacks: Enter the Petya attack.   The Petya family of malware is a ransomware variant that encrypts both the files and the partition of the hard drive, displaying a bootup … Continued

Read More
Risk Assessments: A Step-By-Step Guide

Risk Assessments: A Step-By-Step Guide

  Performing risk assessments is a key part of any organization’s information security management program. Everyone knows that there’s some level of risk involved when it comes to a company’s critical data, assets, and facilities, but how do you quantify and prepare for this risk? The purpose of a risk assessment is to determine what … Continued

Read More