Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Digital Risk Protection: a CISO friendly tool

Explore how Digital Risk Protection can benefit Chief Information Security Officers (CISOs) in safeguarding their organizations against online threats. Understanding Digital Risk Protection Digital Risk Protection refers to the set of tools and strategies used to identify, monitor, and mitigate digital risks that organizations face in today's digitally connected world. These risks can include data breaches, cyber-attacks, brand impersonation, and other online threats.

Cybersecurity leadership in an era of public-private partnerships

SecurityScorecard recently hosted a webinar with our Co-founder and CEO, Dr. Aleksandr Yampolskiy, and Sue Gordon, the former Deputy Director of National Intelligence and SecurityScorecard board member. Gordon drew on her experience as a key advisor to the President and National Security Council to discuss the shared responsibility between public and private organizations in combating cyber threats, the concentration of cyber risk, and the value of easy-to-understand cybersecurity metrics.

SecurityScorecard and Intel: Digging Past the Surface for Enhanced Protection

Threat actors have responded to better protections in the operating system and improved endpoint detection and response (EDR) capabilities by moving down the stack to find entry points with full visibility and privileges into the stack above.

RSA 2024: The Art of Possible

“The best part of RSA is all the amazing people in the community trying to make the world a safer place. It’s also very exciting to see all the innovation to make adversaries’ lives harder – competition and collaboration make us better.” – CEO & Co-Founder Dr. Aleksandr Yampolskiy The SecurityScorecard team has just returned from an incredible week in San Francisco at RSA Conference 2024!

Compliance Risk Assessment for Banks

Banks are one of the most heavily regulated business sectors, with stiff regulatory compliance obligations and close scrutiny from regulators. As such, managing regulatory compliance has become challenging for banks in recent years. Compliance failures can result in significant fines, reputational damage, bad publicity, and even lawsuits. It’s vital for banks to conduct regular compliance risk assessments to identify, evaluate and mitigate emerging risks.

TPRM Strategies for Healthcare: Protecting Patient Data

Third-party data breaches are growing in prominence across the healthcare sector. In 2022, 55% of healthcare organizations suffered a third-party data breach, exposing the personal healthcare data of millions of individuals to malicious actors. To combat this, healthcare organizations must implement third-party risk management strategies as part of HIPAA requirements to protect patient data and prevent these devastating data breaches.

Using Metrics that Matter to Protect Critical Infrastructure

Critical infrastructure services in North America face accelerating threats from both nation-states and other sophisticated threat actors. Governments globally are grappling with how to best balance incentives, support, and direct oversight. Meanwhile, critical infrastructure owners and operators face significant challenges with technology, staff resources, and expertise to better manage cyber resilience.

Vendor Risk Management Examples

You understand the importance of a Vendor Risk Management strategy in mitigating the impact of third-party data breaches. However, you’re still unsure about its application to different vendor cyber risk contexts. To help you bridge this application gap and leverage the complete benefits of a Vendor Risk Management process, this post outlines three common examples of vendor security risks and how a VRM program could be tailored to address them. Learn how UpGuard streamlines Vendor Risk Management >

Creating a Vendor Risk Assessment Framework (6-Step Guide)

Vendor Risk Assessment processes form the core of a Vendor Risk Management program. As such, the efficiency of a VRM program is ultimately dependent on the design of its risk assessment processes. This post guides you through the design of an efficient vendor risk assessment framework in six steps. By implementing this framework, you can establish an efficient risk assessment workflow built upon a scalable process foundation. Learn how UpGuard streamlines vendor risk assessments >