Issue Types
- Address score-impacting CVEs in your Scorecard
- Park domains properly and keep them secure
- Certificate Lifetime Is Longer Than Best Practices
- Certificate Without Revocation Control
- Certificate Is Expired
- Site Does Not Use Best Practices Against Embedding of Malicious Content
Getting Started & Setting Up
- How to log in with a passkey for FIDO authentication
- Provision your SecurityScorecard users with SCIM
- Create API tokens for the SecurityScorecard platform
- Choose how to log into our platform
- Personalize your reports and communications with your logo
- How do I reset my SecurityScorecard password?
Product Overview
- Introducing Daily Scanning Cadence!
- Preparing AWS integration for compliance
- Check platform access with Audit Log
- View compliance through your unique lens with Custom Frameworks
- Get actionable information about your organization or vendors you follow with Scorecard Overview
- Get a quick, actionable view of compliance
Analysis Reporting
- Create your own security narrative with a Custom Report
- Track vulnerabilities and affected parties with the CVE Impact on Companies report
- Gauge likelihood of a ransomware attack with the Ransomware Analytics report
- Track issue prevalence and affected organizations with Issue Type Trends report
- Prioritize vendor risk with the Company Triage report
- Track vendor score improvement with the Vendor Engagement report
Scoring Updates
- Prepare for Scoring 3.0
- Types of Reports accepted for Evidence Based Score Gain
- A Closer Look at Scoring 3.0 Vocabulary and Breach Likelihood
- Recommended actions to improve your Scoring 3.0 score
- Evidence-based score gain
- Scoring Recalibration FAQ
Scorecard
- Understanding the concept of related domains
- Tag your Scorecards and assets for meaningful contexts
- Understanding Custom Scorecard Licensing in SecurityScorecard
- Understanding Breaches on SecurityScorecard
- Now manage your subsidiaries with SecurityScorecard (part of Attack Surface capability)
- Smoothing toggle in the History Tab
Third Party Risk Management
- Sending a questionnaire to your Team
- Upload a Questionnaire in Excel Format
- Create a Portfolio
- Contact partners or vendors to initiate collaboration
- Use Action Plans to collaborate with your vendors on security improvements
- Manage supply chain risk with Automatic Vendor Detection