|
By SecurityScorecard
DeepSeek’s rapid ascent in the AI space has made it impossible to ignore. Its sophisticated models and AI assistant have captured global attention. And, while headlines focus on DeepSeek’s capabilities, STRIKE research exposes critical security flaws, hidden data flows, and unanswered questions about who has access to the data and why.
|
By SecurityScorecard
In December 2024, a routine software update concealed a global threat. Attackers from the Lazarus Group, based in North Korea, infiltrated trusted development tools, compromising hundreds of victims worldwide. This sophisticated campaign, code-named “Phantom Circuit,” targeted cryptocurrency and technology developers, employing advanced obfuscation techniques through proxy servers in Hasan, Russia.
|
By SecurityScorecard
Organizations rely heavily on external vendors and suppliers, creating complex supply chains vital for operations. However, this introduces a new dimension of risk: supply chain attacks.
|
By SecurityScorecard
In the realm of cybersecurity, ensuring the authenticity and integrity of transactions or communications is paramount. Non-repudiation, a principle that prevents individuals or entities from denying their actions, is a cornerstone of this assurance. This blog post delves into the best practices and techniques for integrating non-repudiation into your security strategy, safeguarding your digital interactions against disputes and fraud.
|
By SecurityScorecard
The threat landscape refers to the evolving environment of cyber threats, attack methods, and attack vectors targeting organizations, governments, and individuals. Shaped by threat actors like hackers, nation-states, and criminal groups, it has grown increasingly complex with the rise of cloud computing, IoT devices, and interconnected supply chains. These changes have expanded attack surfaces, offering adversaries more opportunities to exploit vulnerabilities.
|
By SecurityScorecard
On January 9, the SecurityScorecard STRIKE team uncovered Operation 99, a cyberattack by the Lazarus Group, North Korea’s state-sponsored hacking unit. This campaign targets software developers looking for freelance Web3 and cryptocurrency work. If you thought fake job offers from the group’s Operation Dream Job campaign were bad, this latest move is a masterclass in deception, sophistication, and malicious intent. Here’s why Operation 99 demands your attention.
|
By SecurityScorecard
Organizations are increasingly reliant on third-party vendors. While this enables agility and innovation, it also introduces significant security risks. Cyberattacks originating from the supply chain are on the rise, underscoring the critical need for robust security measures. This article explores the key elements of building a high-performing supply chain incident response team to effectively mitigate and respond to these threats.
|
By SecurityScorecard
Patient data is among the most sensitive and valuable information in the healthcare industry. A single breach can have devastating consequences, including.
|
By SecurityScorecard
A single breach can have devastating consequences in the highly regulated financial services industry. From reputational damage and customer loss to severe financial penalties, safeguarding your entire ecosystem is paramount. This blog explores the critical role of Managed Services for Supply Chain Detection and Response (SCDR) in securing your financial services organization.
|
By SecurityScorecard
It’s 10:47 PM, and I’m halfway through binge-watching the latest must-see series when my phone buzzes. A notification from SecurityScorecard has my attention instantly: one of our critical vendors has just reported a breach. I hit pause, grab my laptop, and dive straight in. As much as I’d love to ignore it for a few hours, cyber risks don’t come with snooze buttons. Before panic sets in, I’m logging into the SecurityScorecard platform.
|
By SecurityScorecard
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 12 million companies continuously rated. The company is headquartered in New York and operates in 64 countries around the globe.
|
By SecurityScorecard
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 12 million companies continuously rated. The company is headquartered in New York and operates in 64 countries around the globe.
|
By SecurityScorecard
MAX is a comprehensive managed service that proactively identifies critical cybersecurity vulnerabilities and issues throughout your entire supply chain. Once identified, MAX collaborates closely with your team and vendors to promptly address and resolve these vulnerabilities, fortifying your supply chain defenses against potential compromises. When it comes to supply chain cyber risk, MAX has your back.
|
By SecurityScorecard
Today we learn about SecurityScorecard's MAX and how it single-handedly prevented a MAJOR Zero-Day Vulnerability. With SecurityScorecard MAX, you no longer have to worry about your supply chain being at risk. SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 12 million companies continuously rated. The company is headquartered in New York and operates in 64 countries around the globe.
|
By SecurityScorecard
Is the "Website References Object Storage" issue type bringing your rating down and you don't know what to do about it? Watch this short video which explains what these are and what you can do to improve them. SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 12 million companies continuously rated. The company is headquartered in New York and operates in 64 countries around the globe.
|
By SecurityScorecard
Is the "HTTP Proxy Service Detected" issue type bringing your rating down and you don't know what to do about it? Watch this short video which explains what these are and what you can do to improve them. SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 12 million companies continuously rated. The company is headquartered in New York and operates in 64 countries around the globe.
|
By SecurityScorecard
Is the "Telephony/VoIP Device Accessible" issue type bringing your rating down and you don't know what to do about it? Watch this short video which explains what these are and what you can do to improve them. SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 12 million companies continuously rated. The company is headquartered in New York and operates in 64 countries around the globe.
|
By SecurityScorecard
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 12 million companies continuously rated. The company is headquartered in New York and operates in 64 countries around the globe.
|
By SecurityScorecard
Discover how Horiens enhanced its cybersecurity with SecurityScorecard. Watch our customer testimonial to see how they achieved an A rating, reduced security monitoring time by 83%, and improved their supply chain risk management. SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 12 million companies continuously rated. The company is headquartered in New York and operates in 64 countries around the globe.
|
By SecurityScorecard
Dive into the latest SecurityScorecard research with Rob Ames, Staff Threat Researcher, and Travis Hawley, Former Air Force Intelligence Analyst, as they unravel the complexities of Volt Typhoon's recent compromise of 30% of Cisco RV320/325 devices. They explore the technical and user-side reasons behind this significant cyber threat, its impact, and what it means for future cybersecurity trends. Don't miss out on their in-depth analysis and insights on evolving state-sponsored cyber threats.
|
By SecurityScorecard
Corporate board members are known for their relentless focus on the bottom line -- and with good reason. CISOs and other security executives are often mired in technical language and many times, unable to communicate the business impact that cybersecurity has on the bottom line. This helps explain why the average tenure of a CISO is roughly two years.
|
By SecurityScorecard
The COVID-19 pandemic has disrupted businesses in ways that few had planned for, resulting in shutdowns, global economic downturn, supply chain volatility, and a sudden uptick in e-commerce and remote work. The disruption is straining security and IT teams who have to quickly respond and adapt to a series of unanticipated business events. How can security and IT teams stay agile, enable business resilience, and manage the shift to the new normal?
|
By SecurityScorecard
In this ebook, we will highlight three principles that are key to implementing a world-class TPRM program. Taken together, these practices will move your organization toward a full 360° view of organizational risk-both internally and across your ecosystem: see risk, solve problems, report results.
|
By SecurityScorecard
A company-wide cybersecurity strategy is absolutely essential to combat today's evolving risk landscape. This means breaking down silos and encouraging the engagement of security experts throughout different business units. By leveraging collective understanding to expose unknown threats, you can amplify the effectiveness of your security program and technology stack. We call this "Modern Cyber Risk Management".
|
By SecurityScorecard
As cybercriminals continue to evolve their threat methodologies, industry standards and governments have revised their compliance programs and audit criteria. Regulators and auditors have increasingly begun requiring organizations to mature their programs in order to ensure continuous monitoring as well as senior management and board-level oversight.
|
By SecurityScorecard
Whether it's about cutting costs, reducing third-party incidents, regulatory or internal scrutiny, it's likely that you are looking to mature your vendor risk management (VRM) program. This ebook will show you how to improve your vendor risk management program in three parts and how to take it to a mature state, ready to handle the modern risk that lies ahead. Download the complete guide to building your vendor risk management program.
- February 2025 (1)
- January 2025 (8)
- December 2024 (7)
- November 2024 (6)
- October 2024 (5)
- September 2024 (4)
- August 2024 (8)
- July 2024 (4)
- June 2024 (3)
- May 2024 (15)
- April 2024 (12)
- March 2024 (12)
- February 2024 (14)
- January 2024 (11)
- December 2023 (44)
- November 2023 (28)
- October 2023 (22)
- September 2023 (11)
- August 2023 (11)
- July 2023 (7)
- June 2023 (17)
- May 2023 (8)
- April 2023 (9)
- March 2023 (15)
- February 2023 (9)
- January 2023 (8)
- December 2022 (9)
- November 2022 (16)
- October 2022 (14)
- September 2022 (19)
- August 2022 (13)
- July 2022 (15)
- June 2022 (25)
- May 2022 (15)
- April 2022 (22)
- March 2022 (20)
- February 2022 (20)
- January 2022 (11)
- December 2021 (14)
- November 2021 (16)
- October 2021 (10)
- September 2021 (11)
- August 2021 (11)
- July 2021 (15)
- June 2021 (23)
- May 2021 (2)
- April 2021 (2)
- March 2021 (1)
- August 2020 (1)
Constantly emerging sophisticated cyber attacks jeopardize your business every minute of every day. SecurityScorecard instantly identifies vulnerabilities, active exploits, and advanced cyber threats to help you rigorously protect your business and strengthen your security posture – from an outside-in perspective, enabling you to see what a hacker sees.
Get your free scorecard and learn how you stack up across 10 categories of risk. Answer a few simple questions and instantly receive your score in your business email.
Best-of-breed capabilities for tech-forward organizations:
- Third-Party Risk Management: Get instant visibility into the security posture of your vendors and business partners.
- Enterprise Cyber Risk Management: Discover, monitor, and report on the security vulnerabilities in your data centers and systems.
- Cyber Insurance: Accurately assess the security posture of insureds and continuously monitor your portfolio.
- Executive-Level Reporting: Effectively communicate your cybersecurity strategy and risk to the Board and C-Suite.
- Due Diligence: Gain insight into the cyber risk of any company, make data driven business decisions, and reduce financial risk.
- Compliance: SecurityScorecard enables organizations to easily prove and maintain compliance with leading regulation and standards mandates including PCI, NIST, SOX, GDPR, and many others.
Cybersecurity risk management for tech companies.