CINXE.COM
Curity Cyber Security Rating & Vendor Risk Report | SecurityScorecard
<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width"/><link rel="manifest" href="/security-rating/site.webmanifest"/><meta name="msapplication-TileColor" content="#000000"/><meta name="msapplication-config" content="/security-rating/browserconfig.xml"/><link rel="canonical" href="https://scores.securityscorecard.io/security-rating/curity.io?utm_medium=badge&utm_source=curity.io&utm_campaign=seal-of-trust&utm_content=https%3A%2F%2Fplatform.securityscorecard.io%2F"/><meta property="og:url" content="https://scores.securityscorecard.io/security-rating/curity.io?utm_medium=badge&utm_source=curity.io&utm_campaign=seal-of-trust&utm_content=https%3A%2F%2Fplatform.securityscorecard.io%2F"/><title>Curity Cyber Security Rating & Vendor Risk Report | SecurityScorecard</title><meta name="description" content="View Curity's cyber security risk rating against other vendors' scores. Explore cyber risks, data breaches, and cybersecurity incidents involving Curity"/><meta property="og:title" content="Curity Cyber Security Rating & Vendor Risk Report | SecurityScorecard"/><meta property="og:description" content="View Curity's cyber security risk rating against other vendors' scores. Explore cyber risks, data breaches, and cybersecurity incidents involving Curity"/><meta name="twitter:title" content="Curity Security Score and Breaches | SecurityScorecard"/><meta name="twitter:description" content="View Curity's cyber security risk rating against other vendors' scores. Explore cyber risks, data breaches, and cybersecurity incidents involving Curity"/><meta name="next-head-count" content="13"/><script> (function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-TQH6FX'); </script><script> (function(){var a=window.mutiny=window.mutiny||{};if(!window.mutiny.client){a.client={_queue:{}};var b=["identify","trackConversion"];var c=[].concat(b,["defaultOptOut","optOut","optIn"]);var d=function factory(c){return function(){for(var d=arguments.length,e=new Array(d),f=0;f<d;f++){e[f]=arguments[f]}a.client._queue[c]=a.client._queue[c]||[];if(b.includes(c)){return new Promise(function(b,d){a.client._queue[c].push({args:e,resolve:b,reject:d});setTimeout(d,500)})}else{a.client._queue[c].push({args:e})}}};c.forEach(function(b){a.client[b]=d(b)})}})(); </script><script src="https://client-registry.mutinycdn.com/personalize/client/4f6ca7fced130fc0.js" data-cfasync="false" async=""></script><script> window['_fs_debug'] = false; window['_fs_host'] = 'fullstory.com'; window['_fs_script'] = 'edge.fullstory.com/s/fs.js'; window['_fs_org'] = '35500'; window['_fs_namespace'] = 'FS'; (function(m,n,e,t,l,o,g,y){ if (e in m) {if(m.console && m.console.log) { m.console.log('FullStory namespace conflict. Please set window["_fs_namespace"].');} return;} g=m[e]=function(a,b,s){g.q?g.q.push([a,b,s]):g._api(a,b,s);};g.q=[]; o=n.createElement(t);o.async=1;o.crossOrigin='anonymous';o.src='https://'+_fs_script; y=n.getElementsByTagName(t)[0];y.parentNode.insertBefore(o,y); g.identify=function(i,v,s){g(l,{uid:i},s);if(v)g(l,v,s)};g.setUserVars=function(v,s){g(l,v,s)};g.event=function(i,v,s){g('event',{n:i,p:v},s)}; g.anonymize=function(){g.identify(!!0)}; g.shutdown=function(){g("rec",!1)};g.restart=function(){g("rec",!0)}; g.log = function(a,b){g("log",[a,b])}; g.consent=function(a){g("consent",!arguments.length||a)}; g.identifyAccount=function(i,v){o='account';v=v||{};v.acctId=i;g(o,v)}; g.clearUserCookie=function(){}; g.setVars=function(n, p){g('setVars',[n,p]);}; g._w={};y='XMLHttpRequest';g._w[y]=m[y];y='fetch';g._w[y]=m[y]; if(m[y])m[y]=function(){return g._w[y].apply(this,arguments)}; g._v="1.3.0"; })(window,document,window['_fs_namespace'],'script','user');</script><script> (function(apiKey){ (function(p,e,n,d,o){var v,w,x,y,z;o=p[d]=p[d]||{};o._q=o._q||[]; v=['initialize','identify','updateOptions','pageLoad','track'];for(w=0,x=v.length;w<x;++w)(function(m){ o[m]=o[m]||function(){o._q[m===v[0]?'unshift':'push']([m].concat([].slice.call(arguments,0)));};})(v[w]); y=e.createElement(n);y.async=!0;y.src='https://cdn.pendo.io/agent/static/'+apiKey+'/pendo.js'; z=e.getElementsByTagName(n)[0];z.parentNode.insertBefore(y,z);})(window,document,'script','pendo'); })('c18819ef-f185-46a7-6c2f-59bf376fc654'); </script><script> window.heap=window.heap||[],heap.load=function(e,t){window.heap.appid=e,window.heap.config=t=t||{};var r=document.createElement("script");r.type="text/javascript",r.async=!0,r.src="https://cdn.heapanalytics.com/js/heap-"+e+".js";var a=document.getElementsByTagName("script")[0];a.parentNode.insertBefore(r,a);for(var n=function(e){return function(){heap.push([e].concat(Array.prototype.slice.call(arguments,0)))}},p=["addEventProperties","addUserProperties","clearEventProperties","identify","resetIdentity","removeEventProperty","setEventProperties","track","unsetEventProperty"],o=0;o<p.length;o++)heap[p[o]]=n(p[o])}; heap.load(714539924); </script><meta http-equiv="Content-Language" content="en"/><link rel="shortcut icon" href="/security-rating/_next/static/media/favicon.b414921f.ico"/><link rel="icon" type="image/svg+xml" href="/security-rating/_next/static/media/favicon.98a8ded6.svg"/><meta property="og:image" content="https://s3.us-east-2.amazonaws.com/imarc-securityscorecard.com/prod/images/01-NEW-assets/SEO/_1200x630_crop_center-center_82_none/OpenGraph-SSC-Dark.jpg"/><meta property="og:type" content="website"/><meta property="og:site_name" content="securityscorecard.com"/><meta property="og:author" content="securityscorecard.com"/><meta name="twitter:card" content="summary_large_image"/><meta name="twitter:site" content="@security_score"/><meta name="twitter:image" content="https://s3.us-east-2.amazonaws.com/imarc-securityscorecard.com/prod/images/01-NEW-assets/SEO/_1200x630_crop_center-center_82_none/OpenGraph-SSC-Dark.jpg"/><link rel="mask-icon" href="/security-rating/_next/static/media/touch-icon.58c446f9.png" color="#5bbad5"/><link rel="apple-touch-icon" sizes="180x180" href="/security-rating/_next/static/media/touch-icon.58c446f9.png"/><link rel="icon" type="image/png" sizes="32x32" href="/security-rating/_next/static/media/favicon-32x32.463f43b3.png"/><link rel="icon" type="image/png" sizes="16x16" href="/security-rating/_next/static/media/favicon-16x16.150edba7.png"/><meta name="theme-color" content="#579AA0"/><link rel="preconnect" href="https://use.typekit.net" crossorigin /><link data-next-font="" rel="preconnect" href="/" crossorigin="anonymous"/><link rel="preload" href="/security-rating/_next/static/css/12eca9a40955af22.css" as="style"/><link rel="stylesheet" href="/security-rating/_next/static/css/12eca9a40955af22.css" data-n-g=""/><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/security-rating/_next/static/chunks/polyfills-78c92fac7aa8fdd8.js"></script><script src="/security-rating/_next/static/chunks/webpack-5edf9bf40cbf2628.js" defer=""></script><script src="/security-rating/_next/static/chunks/framework-2c16ac744b6cdea6.js" defer=""></script><script src="/security-rating/_next/static/chunks/main-12d16fde52b687be.js" defer=""></script><script src="/security-rating/_next/static/chunks/pages/_app-c447dd14e22f880e.js" defer=""></script><script src="/security-rating/_next/static/chunks/544-c6a62dbdcbb27001.js" defer=""></script><script src="/security-rating/_next/static/chunks/679-28fec0c2b6fea3ef.js" defer=""></script><script src="/security-rating/_next/static/chunks/192-a6a52002fb0635ea.js" defer=""></script><script src="/security-rating/_next/static/chunks/228-a5d1cd4e4fbb2061.js" defer=""></script><script src="/security-rating/_next/static/chunks/pages/%5Bdomain%5D-575887314c40e722.js" defer=""></script><script src="/security-rating/_next/static/S3EFI6AifLDsDbaJ1QxUV/_buildManifest.js" defer=""></script><script src="/security-rating/_next/static/S3EFI6AifLDsDbaJ1QxUV/_ssgManifest.js" defer=""></script><style data-styled="" data-styled-version="6.1.8">.klZKlA{box-sizing:border-box;padding:0.5rem 1rem;}/*!sc*/ .hGfIdt{box-sizing:border-box;padding:0.25rem;}/*!sc*/ .clHXvY{box-sizing:border-box;padding:0rem;}/*!sc*/ .cQPkGK{box-sizing:border-box;padding:2rem;}/*!sc*/ data-styled.g4[id="Padbox--wdo9bk"]{content:"klZKlA,hGfIdt,clHXvY,cQPkGK,"}/*!sc*/ .kfhliI{display:flex;flex-direction:column;flex-wrap:nowrap;align-items:stretch;}/*!sc*/ .kfhliI.kfhliI>*{margin-top:0;margin-bottom:0;}/*!sc*/ .kfhliI.kfhliI>*+*{margin-top:2rem;}/*!sc*/ .kfhksO{display:flex;flex-direction:column;flex-wrap:nowrap;align-items:stretch;}/*!sc*/ .kfhksO.kfhksO>*{margin-top:0;margin-bottom:0;}/*!sc*/ .kfhksO.kfhksO>*+*{margin-top:0rem;}/*!sc*/ .iFfNHY{display:flex;flex-direction:column;flex-wrap:nowrap;align-items:center;}/*!sc*/ .iFfNHY.iFfNHY>*{margin-top:0;margin-bottom:0;}/*!sc*/ .iFfNHY.iFfNHY>*+*{margin-top:2rem;}/*!sc*/ .kfhjXT{display:flex;flex-direction:column;flex-wrap:nowrap;align-items:stretch;}/*!sc*/ .kfhjXT.kfhjXT>*{margin-top:0;margin-bottom:0;}/*!sc*/ .kfhjXT.kfhjXT>*+*{margin-top:1rem;}/*!sc*/ .kNcAzf{display:flex;flex-direction:column;flex-wrap:nowrap;align-items:stretch;}/*!sc*/ .kNcAzf.kNcAzf>*{margin-top:0;margin-bottom:0;}/*!sc*/ .kNcAzf.kNcAzf>*+*{margin-top:0.25rem;}/*!sc*/ .ghHCJp{display:flex;flex-direction:column;flex-wrap:nowrap;align-items:stretch;}/*!sc*/ .ghHCJp.ghHCJp>*{margin-top:0;margin-bottom:0;}/*!sc*/ .ghHCJp.ghHCJp>*+*{margin-top:0.5rem;}/*!sc*/ data-styled.g5[id="Stack--1woa0u5"]{content:"kfhliI,kfhksO,iFfNHY,kfhjXT,kNcAzf,ghHCJp,"}/*!sc*/ .dFQcyD{display:flex;flex-direction:row;flex-wrap:nowrap;justify-content:space-between;align-items:center;}/*!sc*/ .dFQcyD >:first-child{flex:1 1 0%;}/*!sc*/ .dFQcyD.dFQcyD>*{margin-left:0;margin-right:0;}/*!sc*/ .dFQcyD.dFQcyD>*+*{margin-left:1rem;}/*!sc*/ .hSQwnI{display:flex;flex-direction:row;flex-wrap:nowrap;justify-content:flex-end;}/*!sc*/ .hSQwnI.hSQwnI>*{margin-left:0;margin-right:0;}/*!sc*/ .hSQwnI.hSQwnI>*+*{margin-left:0.5rem;}/*!sc*/ .knMBfK{display:flex;flex-direction:row;flex-wrap:nowrap;align-items:center;}/*!sc*/ .knMBfK.knMBfK>*{margin-left:0;margin-right:0;}/*!sc*/ .knMBfK.knMBfK>*+*{margin-left:0.5rem;}/*!sc*/ .kRErYj{display:flex;flex-direction:row;flex-wrap:nowrap;justify-content:center;align-items:center;}/*!sc*/ .kRErYj.kRErYj>*{margin-left:0;margin-right:0;}/*!sc*/ .kRErYj.kRErYj>*+*{margin-left:0.25rem;}/*!sc*/ .fhrUZT{display:flex;flex-direction:row;flex-wrap:nowrap;}/*!sc*/ .fhrUZT.fhrUZT>*{margin-left:0;margin-right:0;}/*!sc*/ .fhrUZT.fhrUZT>*+*{margin-left:1rem;}/*!sc*/ .cSRckA{display:flex;flex-direction:row;flex-wrap:nowrap;align-items:center;}/*!sc*/ .cSRckA.cSRckA>*{margin-left:0;margin-right:0;}/*!sc*/ .cSRckA.cSRckA>*+*{margin-left:1rem;}/*!sc*/ .fgenbc{display:flex;flex-direction:row;flex-wrap:nowrap;align-items:flex-end;}/*!sc*/ .fgenbc.fgenbc>*{margin-left:0;margin-right:0;}/*!sc*/ .fgenbc.fgenbc>*+*{margin-left:0.5rem;}/*!sc*/ .bHKwsV{display:flex;flex-direction:row;flex-wrap:nowrap;}/*!sc*/ .bHKwsV >:nth-child(1){flex:1 1 0%;}/*!sc*/ .bHKwsV.bHKwsV>*{margin-left:0;margin-right:0;}/*!sc*/ .bHKwsV.bHKwsV>*+*{margin-left:0.5rem;}/*!sc*/ .eykNGy{display:flex;flex-direction:row;flex-wrap:nowrap;justify-content:center;align-items:center;}/*!sc*/ .eykNGy.eykNGy>*{margin-left:0;margin-right:0;}/*!sc*/ .eykNGy.eykNGy>*+*{margin-left:0rem;}/*!sc*/ .fhrUZS{display:flex;flex-direction:row;flex-wrap:nowrap;}/*!sc*/ .fhrUZS.fhrUZS>*{margin-left:0;margin-right:0;}/*!sc*/ .fhrUZS.fhrUZS>*+*{margin-left:0rem;}/*!sc*/ data-styled.g6[id="Inline--benosd"]{content:"dFQcyD,hSQwnI,knMBfK,kRErYj,fhrUZT,cSRckA,fgenbc,bHKwsV,eykNGy,fhrUZS,"}/*!sc*/ .evGdNv{box-sizing:content-box;margin-left:auto;margin-right:auto;max-width:80rem;padding-left:0rem;padding-right:0rem;}/*!sc*/ data-styled.g12[id="sc-beySPh"]{content:"evGdNv,"}/*!sc*/ .bYoByA{color:#888888;}/*!sc*/ .iBwfAu{color:inherit;}/*!sc*/ data-styled.g14[id="sc-guDLey"]{content:"bYoByA,iBwfAu,"}/*!sc*/ .bcAibp{font-family:Inter,'Lato','Helvetica Neue',Arial,Helvetica,sans-serif;font-weight:500;margin-top:5rem;margin-bottom:2.5rem;color:#2a2a2a;font-size:1.75rem;line-height:1.25;}/*!sc*/ data-styled.g16[id="Heading__HeadingH2--1e961ka"]{content:"bcAibp,"}/*!sc*/ .eiXfam{font-family:Inter,'Lato','Helvetica Neue',Arial,Helvetica,sans-serif;font-weight:500;margin-top:3.75rem;margin-bottom:1.875rem;color:#2a2a2a;font-size:1.5rem;line-height:1.25;}/*!sc*/ data-styled.g17[id="Heading__HeadingH3--1plv1v3"]{content:"eiXfam,"}/*!sc*/ .cfktZQ{font-family:Inter,'Lato','Helvetica Neue',Arial,Helvetica,sans-serif;font-weight:500;margin-top:2.5rem;margin-bottom:1.25rem;color:#2a2a2a;font-size:1.25rem;line-height:1.25;font-weight:500;}/*!sc*/ data-styled.g18[id="Heading__HeadingH4--6ftza9"]{content:"cfktZQ,"}/*!sc*/ .cWvedZ{font-family:Inter,'Lato','Helvetica Neue',Arial,Helvetica,sans-serif;font-weight:500;margin-top:2.5rem;margin-bottom:1.25rem;color:#2a2a2a;font-size:1.125rem;line-height:1.25;font-weight:500;}/*!sc*/ data-styled.g19[id="Heading__HeadingH5--j84ufz"]{content:"cWvedZ,"}/*!sc*/ .litgnG{margin:0;border:none;font-family:inherit;font-weight:500;background-color:transparent;white-space:nowrap;cursor:pointer;color:#014FCF;border-radius:4px;}/*!sc*/ .litgnG:hover{color:#002B72;text-decoration:underline;}/*!sc*/ .litgnG:active{color:#014FCF;}/*!sc*/ data-styled.g20[id="Link__LinkRoot--929tdw"]{content:"litgnG,"}/*!sc*/ .bmkJbS{font-family:inherit;font-weight:700;font-size:0.875rem;line-height:1rem;color:#2a2a2a;}/*!sc*/ .jVRWeo{font-family:inherit;font-weight:inherit;font-size:1rem;line-height:1.25rem;color:#2a2a2a;}/*!sc*/ .hoRixw{font-family:inherit;font-weight:inherit;font-size:0.875rem;line-height:1rem;color:#2a2a2a;}/*!sc*/ .iqqVEx{font-family:inherit;font-weight:inherit;font-size:0.875rem;line-height:1rem;color:#686868;}/*!sc*/ .jpeagq{font-family:inherit;font-weight:700;color:#2a2a2a;}/*!sc*/ .hMaXII{font-family:inherit;font-weight:inherit;color:#2a2a2a;}/*!sc*/ .dHHMJP{font-family:inherit;font-weight:700;font-size:inherit;line-height:inherit;color:#2a2a2a;}/*!sc*/ data-styled.g21[id="Text--1h8n1uh"]{content:"bmkJbS,jVRWeo,hoRixw,iqqVEx,jpeagq,hMaXII,dHHMJP,"}/*!sc*/ .dcreLt{margin-bottom:0.625rem;}/*!sc*/ .kCJaVN{margin-bottom:0.625rem;margin-top:1.5rem;margin-bottom:1.5rem;}/*!sc*/ data-styled.g24[id="Paragraph--10c6bbj"]{content:"dcreLt,kCJaVN,"}/*!sc*/ .jyhqeA{margin-top:0.9375rem;margin-bottom:0.9375rem;margin-left:0rem;margin-right:0rem;border-radius:50%;width:1rem;height:1rem;animation:fvtopB 1s infinite linear;border:solid rgba(0,0,0,0.2);border-width:2px;border-top-color:#000;}/*!sc*/ data-styled.g30[id="Spinner--l5qmjd"]{content:"jyhqeA,"}/*!sc*/ .kGKjBV{display:inline-flex;align-items:center;justify-content:center;border:none;border-radius:4px;font-family:Inter,'Lato','Helvetica Neue',Arial,Helvetica,sans-serif;font-weight:400;cursor:pointer;text-align:center;white-space:nowrap;transition:var(--sscds-action-transition),transform 50ms var(--sscds-transition-fn);margin:0;height:2.25rem;line-height:1;font-size:0.875rem;background-color:transparent;border:2px solid #014FCF;color:#014FCF;}/*!sc*/ .kGKjBV:hover,.kGKjBV.hover{background-color:#E7F0FF;color:#002B72;border-color:#002B72;}/*!sc*/ .kGKjBV:disabled,.kGKjBV.disabled{color:#888888;border-color:#888888;}/*!sc*/ .kGKjBV,.kGKjBV:hover,.kGKjBV:focus-visible,.kGKjBV:active{text-decoration:none;}/*!sc*/ .kGKjBV:active,.kGKjBV.kGKjBV.kGKjBV.active{transform:scale(0.98);}/*!sc*/ @media (prefers-reduced-motion){.kGKjBV:active,.kGKjBV.kGKjBV.kGKjBV.active{transform:scale(1);}}/*!sc*/ .bdZqqb{display:inline-flex;align-items:center;justify-content:center;border:none;border-radius:4px;font-family:Inter,'Lato','Helvetica Neue',Arial,Helvetica,sans-serif;font-weight:400;cursor:pointer;text-align:center;white-space:nowrap;transition:var(--sscds-action-transition),transform 50ms var(--sscds-transition-fn);margin:0;height:2.25rem;line-height:1;font-size:0.875rem;text-decoration:none;background-color:#000;color:#fff;}/*!sc*/ .bdZqqb:hover,.bdZqqb.hover{color:#fff;background-color:#000;}/*!sc*/ .bdZqqb:disabled,.bdZqqb.disabled{background-color:#e8e8e8;color:#888888;}/*!sc*/ .bdZqqb,.bdZqqb:hover,.bdZqqb:focus-visible,.bdZqqb:active{text-decoration:none;}/*!sc*/ .bdZqqb:active,.bdZqqb.bdZqqb.bdZqqb.active{transform:scale(0.98);}/*!sc*/ @media (prefers-reduced-motion){.bdZqqb:active,.bdZqqb.bdZqqb.bdZqqb.active{transform:scale(1);}}/*!sc*/ .GYVjD{display:inline-flex;align-items:center;justify-content:center;border:none;border-radius:4px;font-family:Inter,'Lato','Helvetica Neue',Arial,Helvetica,sans-serif;font-weight:400;cursor:pointer;text-align:center;white-space:nowrap;transition:var(--sscds-action-transition),transform 50ms var(--sscds-transition-fn);margin:0;height:2.25rem;line-height:1;font-size:0.875rem;background-color:transparent;border-color:transparent;padding-left:0;padding-right:0;font-weight:500;color:#014FCF;}/*!sc*/ .GYVjD:hover,.GYVjD.hover{color:#002B72;background:#E7F0FF;}/*!sc*/ .GYVjD:disabled,.GYVjD.disabled{color:#888888;}/*!sc*/ .GYVjD,.GYVjD:hover,.GYVjD:focus-visible,.GYVjD:active{text-decoration:none;}/*!sc*/ .GYVjD:active,.GYVjD.GYVjD.GYVjD.active{transform:scale(0.98);}/*!sc*/ @media (prefers-reduced-motion){.GYVjD:active,.GYVjD.GYVjD.GYVjD.active{transform:scale(1);}}/*!sc*/ .dbiJzT{display:inline-flex;align-items:center;justify-content:center;border:none;border-radius:4px;font-family:Inter,'Lato','Helvetica Neue',Arial,Helvetica,sans-serif;font-weight:400;cursor:pointer;text-align:center;white-space:nowrap;transition:var(--sscds-action-transition),transform 50ms var(--sscds-transition-fn);margin:0;width:100%;height:2.25rem;line-height:1;font-size:0.875rem;text-decoration:none;background-color:#014FCF;color:#fff;}/*!sc*/ .dbiJzT:hover,.dbiJzT.hover{color:#fff;background-color:#002B72;}/*!sc*/ .dbiJzT:disabled,.dbiJzT.disabled{background-color:#e8e8e8;color:#888888;}/*!sc*/ .dbiJzT,.dbiJzT:hover,.dbiJzT:focus-visible,.dbiJzT:active{text-decoration:none;}/*!sc*/ .dbiJzT:active,.dbiJzT.dbiJzT.dbiJzT.active{transform:scale(0.98);}/*!sc*/ @media (prefers-reduced-motion){.dbiJzT:active,.dbiJzT.dbiJzT.dbiJzT.active{transform:scale(1);}}/*!sc*/ .dlbGVC{display:inline-flex;align-items:center;justify-content:center;border:none;border-radius:4px;font-family:Inter,'Lato','Helvetica Neue',Arial,Helvetica,sans-serif;font-weight:400;cursor:pointer;text-align:center;white-space:nowrap;transition:var(--sscds-action-transition),transform 50ms var(--sscds-transition-fn);margin:0;width:100%;height:2.25rem;line-height:1;font-size:0.875rem;background-color:transparent;border:2px solid #014FCF;color:#014FCF;}/*!sc*/ .dlbGVC:hover,.dlbGVC.hover{background-color:#E7F0FF;color:#002B72;border-color:#002B72;}/*!sc*/ .dlbGVC:disabled,.dlbGVC.disabled{color:#888888;border-color:#888888;}/*!sc*/ .dlbGVC,.dlbGVC:hover,.dlbGVC:focus-visible,.dlbGVC:active{text-decoration:none;}/*!sc*/ .dlbGVC:active,.dlbGVC.dlbGVC.dlbGVC.active{transform:scale(0.98);}/*!sc*/ @media (prefers-reduced-motion){.dlbGVC:active,.dlbGVC.dlbGVC.dlbGVC.active{transform:scale(1);}}/*!sc*/ .eLAUfE{display:inline-flex;align-items:center;justify-content:center;border:none;border-radius:4px;font-family:Inter,'Lato','Helvetica Neue',Arial,Helvetica,sans-serif;font-weight:400;cursor:pointer;text-align:center;white-space:nowrap;transition:var(--sscds-action-transition),transform 50ms var(--sscds-transition-fn);margin:0;height:2.25rem;line-height:1;font-size:0.875rem;text-decoration:none;background-color:#014FCF;color:#fff;}/*!sc*/ .eLAUfE:hover,.eLAUfE.hover{color:#fff;background-color:#002B72;}/*!sc*/ .eLAUfE:disabled,.eLAUfE.disabled{background-color:#e8e8e8;color:#888888;}/*!sc*/ .eLAUfE,.eLAUfE:hover,.eLAUfE:focus-visible,.eLAUfE:active{text-decoration:none;}/*!sc*/ .eLAUfE:active,.eLAUfE.eLAUfE.eLAUfE.active{transform:scale(0.98);}/*!sc*/ @media (prefers-reduced-motion){.eLAUfE:active,.eLAUfE.eLAUfE.eLAUfE.active{transform:scale(1);}}/*!sc*/ data-styled.g31[id="sc-dmyCSP"]{content:"kGKjBV,bdZqqb,GYVjD,dbiJzT,dlbGVC,eLAUfE,"}/*!sc*/ .cwjYYY{font-size:0.875rem;}/*!sc*/ data-styled.g32[id="BaseButton__BaseStyledIcon--15tihwg"]{content:"cwjYYY,"}/*!sc*/ .dqVapM{font-weight:400;padding-inline:0;width:auto;}/*!sc*/ data-styled.g48[id="BreadcrumbItem__BreadcrumbLink--rg4cmw"]{content:"dqVapM,"}/*!sc*/ .kIIQfi{list-style-type:none;}/*!sc*/ data-styled.g49[id="BreadcrumbItem__ListItem--gf6fbz"]{content:"kIIQfi,"}/*!sc*/ .dTAyEY{display:flex;align-items:center;justify-content:center;font-size:0.75rem;width:1rem;height:1rem;}/*!sc*/ data-styled.g50[id="Breadcrumbs__IconWrapper--15qt55v"]{content:"dTAyEY,"}/*!sc*/ .gOevTR{display:flex;}/*!sc*/ data-styled.g52[id="Breadcrumbs__BreadcrumbsWrapper--1pbo2uq"]{content:"gOevTR,"}/*!sc*/ .ezDoNb{padding:0;margin:0;list-style:none;}/*!sc*/ data-styled.g53[id="Breadcrumbs__InlineOrderedList--1erqr1o"]{content:"ezDoNb,"}/*!sc*/ .gbXCMj{flex-grow:1;background-color:#fff;border:1px solid #e8e8e8;border-radius:8px;overflow:hidden;box-shadow:0px 4px 12px rgba(0, 0, 0, 0.07);}/*!sc*/ data-styled.g56[id="Card__CardWrapper--e9temx"]{content:"gbXCMj,"}/*!sc*/ .cAYYDZ{height:100%;}/*!sc*/ data-styled.g57[id="Card__CardStack--i59ru0"]{content:"cAYYDZ,"}/*!sc*/ .gpOPLl{padding:1rem 1.5rem;}/*!sc*/ data-styled.g58[id="Card__CardContainer--159myky"]{content:"gpOPLl,"}/*!sc*/ .cBybhg{padding-top:0.25rem;}/*!sc*/ data-styled.g62[id="CardHeader__TitleArea--rafb1p"]{content:"cBybhg,"}/*!sc*/ .iEbwKf{margin-top:0px;margin-bottom:0px;display:-webkit-box;-webkit-line-clamp:unset;-webkit-box-orient:vertical;overflow:hidden;}/*!sc*/ data-styled.g63[id="CardHeader__Title--1wlzst8"]{content:"iEbwKf,"}/*!sc*/ .Csqzj{display:-webkit-box;-webkit-line-clamp:unset;-webkit-box-orient:vertical;overflow:hidden;}/*!sc*/ data-styled.g64[id="CardHeader__Subtitle--b6mkb3"]{content:"Csqzj,"}/*!sc*/ .hVYkNg{display:flex;align-items:flex-start;margin-right:calc(0.5rem * -1)!important;}/*!sc*/ data-styled.g65[id="CardHeader__ButtonsArea--9t7x0c"]{content:"hVYkNg,"}/*!sc*/ .eNFFdB{position:relative;min-height:1.5rem;width:100%;}/*!sc*/ @media (min-width:900px){.eNFFdB{height:2.5rem;}}/*!sc*/ data-styled.g232[id="ScorecardHeader__LogoWrapper-sc-1nn98ix-0"]{content:"eNFFdB,"}/*!sc*/ .cKWqGk{display:contents;position:relative;}/*!sc*/ data-styled.g233[id="ScorecardHeader__StyledLink-sc-1nn98ix-1"]{content:"cKWqGk,"}/*!sc*/ .gIAiPR{background-color:#fff;border-bottom:1px solid #a8a8a8;position:fixed;width:100%;left:0;top:0;z-index:2;overflow:hidden;}/*!sc*/ data-styled.g234[id="Header__HeaderContainer-sc-ei0f80-0"]{content:"gIAiPR,"}/*!sc*/ .wXxou{box-sizing:border-box;padding:0.5rem 1rem;}/*!sc*/ @media (min-width:900px){.wXxou{padding:1rem 2rem;}}/*!sc*/ @media (min-width:1280px){.wXxou{margin:0 -1.25rem;}}/*!sc*/ data-styled.g235[id="Header__HeaderWrapper-sc-ei0f80-1"]{content:"wXxou,"}/*!sc*/ .dSMEFV{color:#555555;}/*!sc*/ data-styled.g236[id="Footer__FooterLink-sc-1wok6zp-0"]{content:"dSMEFV,"}/*!sc*/ .loiYQB{display:block;height:1px;margin:0 2rem;width:calc(100 - 4rem);background-color:#a8a8a8;}/*!sc*/ data-styled.g237[id="Footer__Divider-sc-1wok6zp-1"]{content:"loiYQB,"}/*!sc*/ @media (min-width:900px){.gzHNdG{display:none;}}/*!sc*/ data-styled.g238[id="Footer__DividerTop-sc-1wok6zp-2"]{content:"gzHNdG,"}/*!sc*/ .gRVuyk{flex-shrink:0;background-color:#f3f3f3;box-shadow:inset 0px 1px 0px rgba(0,0,0,0.15);}/*!sc*/ data-styled.g239[id="Footer__FooterContainer-sc-1wok6zp-3"]{content:"gRVuyk,"}/*!sc*/ .ljhiNE{margin:0 auto;max-width:1200px;}/*!sc*/ @media (min-width:900px){.ljhiNE{max-width:calc(1200px + 7.5rem);}}/*!sc*/ data-styled.g240[id="Footer__FooterContent-sc-1wok6zp-4"]{content:"ljhiNE,"}/*!sc*/ @media (min-width:900px){.fEQjlJ{display:flex;}}/*!sc*/ data-styled.g241[id="Footer__FooterTop-sc-1wok6zp-5"]{content:"fEQjlJ,"}/*!sc*/ @media (min-width:900px){.jmQRpS{display:flex;align-items:center;justify-content:space-between;}}/*!sc*/ data-styled.g242[id="Footer__FooterBottom-sc-1wok6zp-6"]{content:"jmQRpS,"}/*!sc*/ .hHSagS{flex-grow:1;margin-top:1.5rem;margin-left:2rem;margin-bottom:2rem;}/*!sc*/ .hHSagS ul{margin-top:1.5rem;margin-left:4rem;}/*!sc*/ @media (min-width:900px){.hHSagS ul{display:grid;margin-top:0.5rem;grid-auto-flow:column;grid-row-gap:1.5625rem;grid-template-rows:repeat(3,1fr);grid-template-columns:repeat(3,1fr);}}/*!sc*/ .hHSagS ul li{font-weight:500;margin:1rem 0;font-size:1rem;line-height:1rem;color:#2a2a2a;}/*!sc*/ .hHSagS ul li:hover{color:#3E85FA;}/*!sc*/ .hHSagS ul li:first-child{margin-top:0.5rem;}/*!sc*/ .hHSagS ul li:last-child{margin-bottom:0.5rem;}/*!sc*/ @media (min-width:900px){.hHSagS ul li{margin:0.5rem;}}/*!sc*/ data-styled.g243[id="Footer__NavigationTopFooter-sc-1wok6zp-7"]{content:"hHSagS,"}/*!sc*/ .eJdDzF{margin-top:2rem;margin-left:2rem;margin-bottom:1.5rem;}/*!sc*/ @media (min-width:900px){.eJdDzF{margin-top:2.25rem;margin-bottom:2rem;}}/*!sc*/ .eJdDzF ul{margin-top:1.5rem;margin-left:4rem;}/*!sc*/ @media (min-width:900px){.eJdDzF ul{display:flex;margin-top:0;margin-left:0;align-items:center;}}/*!sc*/ .eJdDzF ul li{font-weight:500;white-space:nowrap;margin:1rem 0;font-size:0.875rem;line-height:1rem;color:#2a2a2a;}/*!sc*/ .eJdDzF ul li a:hover{color:#3E85FA;}/*!sc*/ @media (min-width:900px){.eJdDzF ul li{display:flex;margin-top:0;margin-bottom:0;align-items:center;margin-right:2rem;}}/*!sc*/ .eJdDzF ul li a,.eJdDzF ul li p{line-height:0.875rem;}/*!sc*/ .eJdDzF ul li:first-child{margin-top:0;}/*!sc*/ .eJdDzF ul li:last-child{margin-bottom:0;}/*!sc*/ data-styled.g244[id="Footer__NavigationLegal-sc-1wok6zp-8"]{content:"eJdDzF,"}/*!sc*/ .ghFnPz{margin-left:2rem;margin-bottom:2rem;}/*!sc*/ @media (min-width:900px){.ghFnPz{margin-top:2.25rem;margin-right:2rem;}}/*!sc*/ .ghFnPz ul{display:flex;align-items:center;margin-left:4rem;}/*!sc*/ @media (min-width:900px){.ghFnPz ul{margin-left:0;}}/*!sc*/ .ghFnPz ul li{margin-left:1.5rem;}/*!sc*/ .ghFnPz ul li a{display:flex;width:1.5rem;height:1.5rem;color:#555555;}/*!sc*/ .ghFnPz ul li a:hover{color:#3E85FA;}/*!sc*/ .ghFnPz ul li:first-child{margin-left:0;}/*!sc*/ data-styled.g245[id="Footer__NavigationSocial-sc-1wok6zp-9"]{content:"ghFnPz,"}/*!sc*/ .grdxao{display:flex;flex-shrink:0;align-items:flex-start;font-size:0.875rem;margin-top:2rem;margin-left:2rem;line-height:1rem;margin-bottom:1.5rem;color:#2a2a2a;}/*!sc*/ .grdxao div:last-child{margin-left:1.5rem;}/*!sc*/ .grdxao div:last-child p{margin:8px 0;}/*!sc*/ .grdxao div:last-child p:first-child{margin-top:0;}/*!sc*/ .grdxao div:last-child p:last-child{margin-bottom:0;}/*!sc*/ data-styled.g246[id="Footer__FooterAddress-sc-1wok6zp-10"]{content:"grdxao,"}/*!sc*/ .jPEJxd{flex:1 0 auto;padding-top:2.5rem;}/*!sc*/ @media (min-width:900px){.jPEJxd{padding-top:4.5rem;}}/*!sc*/ data-styled.g263[id="Content__ContentContainer-sc-117v93n-0"]{content:"jPEJxd,"}/*!sc*/ @media (min-width:900px){.jlpFeO{padding:32px 0 40px;}}/*!sc*/ data-styled.g264[id="Content__ContentWrapper-sc-117v93n-1"]{content:"jlpFeO,"}/*!sc*/ html,body,div,span,applet,object,iframe,h1,h2,h3,h4,h5,h6,p,blockquote,pre,a,abbr,acronym,address,big,cite,code,del,dfn,em,img,ins,kbd,q,s,samp,small,strike,strong,sub,sup,tt,var,b,u,i,center,dl,dt,dd,ol,ul,li,fieldset,form,label,legend,table,caption,tbody,tfoot,thead,tr,th,td,article,aside,canvas,details,embed,figure,figcaption,footer,header,hgroup,main,menu,nav,output,ruby,section,summary,time,mark,audio,video{margin:0;padding:0;border:0;font:inherit;font-size:100%;vertical-align:baseline;}/*!sc*/ article,aside,details,figcaption,figure,footer,header,hgroup,main,menu,nav,section{display:block;}/*!sc*/ *[hidden]{display:none;}/*!sc*/ body{font-family:Inter,'Lato','Helvetica Neue',Arial,Helvetica,sans-serif;font-weight:400;font-size:1rem;line-height:1.25rem;color:#2a2a2a;}/*!sc*/ ol,ul{list-style:none;}/*!sc*/ blockquote,q{quotes:none;}/*!sc*/ blockquote:before,blockquote:after,q:before,q:after{content:'';content:none;}/*!sc*/ table{border-collapse:collapse;border-spacing:0;}/*!sc*/ html{box-sizing:border-box;}/*!sc*/ a{text-decoration:none;color:inherit;}/*!sc*/ button{border:none;margin:0;padding:0;width:auto;overflow:visible;background:transparent;color:inherit;font:inherit;text-align:inherit;outline:none;line-height:inherit;-webkit-appearance:none;}/*!sc*/ *,*:before,*:after{box-sizing:border-box;-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale;user-select:text;}/*!sc*/ p,h1,h2,h3,h4,h5,h6,blockquote,pre,ul,ol,li,table,tr,th,td,input,textarea{user-select:text;}/*!sc*/ html,body,#__next{height:100%;}/*!sc*/ body{background-color:#f9f9f9;overflow:auto;}/*!sc*/ #__next{display:flex;flex-direction:column;}/*!sc*/ data-styled.g265[id="sc-global-iAWKaW1"]{content:"sc-global-iAWKaW1,"}/*!sc*/ .dgmbOB{margin-right:10px!important;}/*!sc*/ data-styled.g266[id="VisitScorecard__BoxText-sc-1pb52x9-0"]{content:"dgmbOB,"}/*!sc*/ .kNLBqA{background-color:#fff;border:1px solid #a8a8a8;border-bottom-width:1px;border-radius:8px;width:256px;height:100px;}/*!sc*/ data-styled.g267[id="Badge__BoxRounded-sc-at5tfa-0"]{content:"kNLBqA,"}/*!sc*/ .flWJBs{height:64px;}/*!sc*/ data-styled.g268[id="Badge__BoxTop-sc-at5tfa-1"]{content:"flWJBs,"}/*!sc*/ .exVJmO{width:64px;height:64px;border-right:1px solid #a8a8a8;}/*!sc*/ data-styled.g269[id="Badge__BoxGrade-sc-at5tfa-2"]{content:"exVJmO,"}/*!sc*/ .gAcrMu{width:calc(100% - 64px);}/*!sc*/ data-styled.g270[id="Badge__BoxLogo-sc-at5tfa-3"]{content:"gAcrMu,"}/*!sc*/ .dTxRyR{border-top:1px solid #a8a8a8;height:36px;}/*!sc*/ data-styled.g271[id="Badge__BoxLink-sc-at5tfa-4"]{content:"dTxRyR,"}/*!sc*/ .dgGYLk{align-items:center;color:#1163EA;display:flex;font-size:1rem;font-weight:500;}/*!sc*/ data-styled.g272[id="Badge__Anchor-sc-at5tfa-5"]{content:"dgGYLk,"}/*!sc*/ .kNwfQE{background:#fff;box-shadow:0px 4px 4px rgba(0, 0, 0, 0.1);border-radius:8px;border:1px solid #a8a8a8;}/*!sc*/ data-styled.g273[id="Card__StyledCard-sc-iqpeu9-0"]{content:"kNwfQE,"}/*!sc*/ .ekLTRt{border-radius:4px;height:80px;display:flex;justify-content:center;align-items:center;background:#f3f3f3;}/*!sc*/ data-styled.g278[id="styled__ScorecardLoadingWrapper-sc-rlehv3-3"]{content:"ekLTRt,"}/*!sc*/ .fNWIqp{display:inline-block;background:#f9f9f9;padding:0 2rem;margin:0;}/*!sc*/ data-styled.g280[id="SectionTitle__TitleH2-sc-1le0dhy-0"]{content:"fNWIqp,"}/*!sc*/ .jhRSXR{background:#f9f9f9;padding:0 1rem;margin:0;}/*!sc*/ @media (min-width:900px){.jhRSXR{padding:0 2rem;}}/*!sc*/ data-styled.g282[id="SectionTitle__LogoWrapper-sc-1le0dhy-2"]{content:"jhRSXR,"}/*!sc*/ .iLbXcX{position:relative;text-align:center;margin-bottom:1.5rem;margin-top:1rem;display:flex;justify-content:center;}/*!sc*/ .iLbXcX:before{content:'';height:1px;width:100%;background:#a8a8a8;position:absolute;left:0;top:calc(50% - 1px);z-index:-1;}/*!sc*/ data-styled.g283[id="SectionTitle__Header-sc-1le0dhy-3"]{content:"iLbXcX,"}/*!sc*/ .cqrSQJ{display:flex;flex-direction:column;padding:0 0.625rem;flex:1;}/*!sc*/ @media (min-width:900px){.cqrSQJ{padding-left:2rem;padding-right:2rem;}}/*!sc*/ data-styled.g284[id="Section-sc-1si8ehc-0"]{content:"cqrSQJ,"}/*!sc*/ @media (min-width:){.eJKTJO{padding:0;}}/*!sc*/ data-styled.g285[id="styled__GridContainer-sc-or1rvv-0"]{content:"eJKTJO,"}/*!sc*/ .bMkseb{display:grid;gap:1.5rem;grid-template-columns:repeat(auto-fit,minmax(19.375rem,1fr));justify-content:center;margin-left:1.375rem;margin-right:1.375rem;}/*!sc*/ @media (min-width:900px){.bMkseb{margin-left:0;margin-right:0;}}/*!sc*/ data-styled.g286[id="styled__GridWrapper-sc-or1rvv-1"]{content:"bMkseb,"}/*!sc*/ .cUJRfl{display:flex;flex-direction:column;overflow:hidden;margin-bottom:1rem;}/*!sc*/ @media (min-width:900px){.cUJRfl{flex:3;min-height:400px;margin:0 1rem;}}/*!sc*/ data-styled.g287[id="Article__ArticleWrapper-sc-ytmzw8-0"]{content:"cUJRfl,"}/*!sc*/ .hVLvSY{font-weight:700;margin-top:1rem;text-align:center;}/*!sc*/ @media (min-width:900px){.hVLvSY{font-size:1.5rem;line-height:1.875rem;font-weight:500;}}/*!sc*/ data-styled.g288[id="Article__Title-sc-ytmzw8-1"]{content:"hVLvSY,"}/*!sc*/ .koHahL{display:flex;height:100%;flex-direction:column;justify-content:space-between;width:100%;}/*!sc*/ data-styled.g289[id="Article__FullWidthPadbox-sc-ytmzw8-2"]{content:"koHahL,"}/*!sc*/ .iSREHL{margin-top:2rem;text-align:center;}/*!sc*/ data-styled.g290[id="Article__Footer-sc-ytmzw8-3"]{content:"iSREHL,"}/*!sc*/ .iWNBkv{display:flex;flex-direction:column;flex-wrap:nowrap;margin:1.5rem 0 0;padding:0 1.375rem;}/*!sc*/ @media (min-width:900px){.iWNBkv{flex-direction:row;margin:0.5rem -1rem 0;padding:0;}}/*!sc*/ data-styled.g291[id="NewToSecurityScorecard__ArticleContainer-sc-zfh7mc-0"]{content:"iWNBkv,"}/*!sc*/ .bqpoFx{display:flex;color:#2a2a2a;text-align:center;align-items:center;flex-direction:column;justify-content:center;padding:0.5rem 2rem 2rem 2rem;}/*!sc*/ .bqpoFx>*+*{margin-top:1rem;}/*!sc*/ @media (min-width:900px){.bqpoFx{flex-direction:row;padding-top:2rem;padding-bottom:0;}.bqpoFx>*+*{margin-top:0;}}/*!sc*/ .bqpoFx p{padding-right:0;}/*!sc*/ @media (min-width:900px){.bqpoFx p{padding-top:0;padding-right:1rem;}}/*!sc*/ data-styled.g292[id="NewToSecurityScorecard__FreeReportContainer-sc-zfh7mc-1"]{content:"bqpoFx,"}/*!sc*/ .jKVCp{box-sizing:border-box;flex-basis:100%;flex-grow:0;padding:0 12px;max-width:100%;}/*!sc*/ @media (min-width:600px){.jKVCp{padding:0 16px;}}/*!sc*/ .bLZfII{box-sizing:border-box;flex-basis:100%;flex-grow:0;padding:0 12px;max-width:100%;}/*!sc*/ @media (min-width:600px){.bLZfII{padding:0 16px;}}/*!sc*/ @media (min-width:0px){.bLZfII{max-width:100%;flex-basis:100%;}}/*!sc*/ @media (min-width:900px){.bLZfII{max-width:50%;flex-basis:50%;}}/*!sc*/ @media (min-width:1200px){.bLZfII{max-width:33.333333333333336%;flex-basis:33.333333333333336%;}}/*!sc*/ .fMlNgY{box-sizing:border-box;flex-basis:100%;flex-grow:0;padding:0 12px;max-width:100%;}/*!sc*/ @media (min-width:600px){.fMlNgY{padding:0 16px;}}/*!sc*/ @media (min-width:0px){.fMlNgY{max-width:100%;flex-basis:100%;}}/*!sc*/ @media (min-width:900px){.fMlNgY{max-width:50%;flex-basis:50%;}}/*!sc*/ @media (min-width:1200px){.fMlNgY{max-width:66.66666666666667%;flex-basis:66.66666666666667%;}}/*!sc*/ .dulOgq{box-sizing:border-box;flex-basis:100%;flex-grow:0;padding:0 12px;max-width:100%;display:flex;justify-content:center;align-items:center;flex-direction:column;}/*!sc*/ @media (min-width:600px){.dulOgq{padding:0 16px;}}/*!sc*/ @media (min-width:0px){.dulOgq{max-width:100%;flex-basis:100%;}}/*!sc*/ data-styled.g293[id="Colstyled__Col-sc-1shi1n0-0"]{content:"jKVCp,bLZfII,fMlNgY,dulOgq,"}/*!sc*/ .gpyRCB{box-sizing:border-box;display:flex;flex-wrap:wrap;margin:0 -12px;}/*!sc*/ @media (min-width:600px){.gpyRCB{margin:0 -16px;}}/*!sc*/ .jSTvGt{box-sizing:border-box;display:flex;flex-wrap:wrap;margin:0 -12px;display:flex;flex-direction:row;}/*!sc*/ @media (min-width:600px){.jSTvGt{margin:0 -16px;}}/*!sc*/ data-styled.g294[id="Rowstyled__Row-sc-44tyro-0"]{content:"gpyRCB,jSTvGt,"}/*!sc*/ .bkoABF{margin-top:1rem;}/*!sc*/ .bkoABF::first-letter{text-transform:uppercase;}/*!sc*/ data-styled.g295[id="Signals__TextSyled-sc-1w3chrm-0"]{content:"bkoABF,"}/*!sc*/ .bKxGGN{position:relative;}/*!sc*/ .bKxGGN:after{display:block;content:' ';background-image:url(/security-rating/_next/static/media/arrow-right.b4e0a6f2.svg);background-size:100% 100%;height:46px;width:8px;position:absolute;right:0;}/*!sc*/ .bKxGGN:last-child:after{display:none;}/*!sc*/ data-styled.g296[id="Signals__ColArrow-sc-1w3chrm-1"]{content:"bKxGGN,"}/*!sc*/ .UeUuf{display:grid;grid-template-columns:repeat(4,1fr);background-color:#fff;border-radius:0.5rem;padding-top:2rem;padding-bottom:2rem;}/*!sc*/ data-styled.g297[id="Signals__Grid-sc-1w3chrm-2"]{content:"UeUuf,"}/*!sc*/ .fUnGsn{height:48px;width:48px;display:flex;justify-content:center;align-items:center;}/*!sc*/ data-styled.g298[id="Signals__ImageWrapper-sc-1w3chrm-3"]{content:"fUnGsn,"}/*!sc*/ .bwGvws{position:absolute;left:0px;top:0px;}/*!sc*/ data-styled.g299[id="IssueItem__IconContainer-sc-1un540i-0"]{content:"bwGvws,"}/*!sc*/ .bxfRed{position:relative;}/*!sc*/ data-styled.g300[id="IssueItem__Container-sc-1un540i-1"]{content:"bxfRed,"}/*!sc*/ .bouoyj{margin-left:3rem;}/*!sc*/ data-styled.g301[id="IssueItem__TextContainer-sc-1un540i-2"]{content:"bouoyj,"}/*!sc*/ .fINNxM{margin-bottom:1.5rem;}/*!sc*/ data-styled.g302[id="ListIssueItems__ItemContainer-sc-15reet9-0"]{content:"fINNxM,"}/*!sc*/ .Wyszu{padding:1.375rem;}/*!sc*/ @media (min-width:900px){.Wyszu{padding:1.875rem;}}/*!sc*/ data-styled.g303[id="WhatDoWeMeasure__BoxStyled-sc-5lvce1-0"]{content:"Wyszu,"}/*!sc*/ .kgbINa{padding-bottom:4rem;}/*!sc*/ @media (min-width:900px){.kgbINa{padding-right:3.125rem;}}/*!sc*/ data-styled.g304[id="WhatDoWeMeasure__LeftContainer-sc-5lvce1-1"]{content:"kgbINa,"}/*!sc*/ @media (min-width:900px){.iPRoFD{padding-left:3.125rem;}}/*!sc*/ data-styled.g305[id="WhatDoWeMeasure__RightContainer-sc-5lvce1-2"]{content:"iPRoFD,"}/*!sc*/ .kjuJrj{padding-right:5.3125rem;margin-bottom:1.5rem;}/*!sc*/ data-styled.g306[id="WhatDoWeMeasure__ParagraphContinaer-sc-5lvce1-3"]{content:"kjuJrj,"}/*!sc*/ .kcprqQ{padding:1rem;}/*!sc*/ .kcprqQ:hover{background-color:#E7F0FF;}/*!sc*/ @media (min-width:900px){.kcprqQ{border:1px solid #a8a8a8;background-color:#fff;border-radius:8px;box-shadow:0px 4px 4px rgba(0,0,0,0.1);padding:2rem;}}/*!sc*/ data-styled.g307[id="styled__NewsItemContainer-sc-16ydsc2-0"]{content:"kcprqQ,"}/*!sc*/ .cuvzas{margin:0;display:block;margin-bottom:1rem;overflow:hidden;text-overflow:ellipsis;display:-webkit-box;-webkit-line-clamp:2;line-clamp:2;-webkit-box-orient:vertical;}/*!sc*/ @media (min-width:900px){.cuvzas{height:2.4rem;}}/*!sc*/ data-styled.g308[id="styled__NewsTitle-sc-16ydsc2-1"]{content:"cuvzas,"}/*!sc*/ .fusuEh{display:flex;align-items:center;}/*!sc*/ data-styled.g309[id="styled__NewsSourceWrapper-sc-16ydsc2-2"]{content:"fusuEh,"}/*!sc*/ .bQRAuZ{max-width:1rem;height:1rem;display:block;}/*!sc*/ data-styled.g311[id="styled__NewsSourceLogo-sc-16ydsc2-4"]{content:"bQRAuZ,"}/*!sc*/ .fGaiBw{margin-left:0.5rem;color:#686868;}/*!sc*/ data-styled.g312[id="styled__NewsSourceName-sc-16ydsc2-5"]{content:"fGaiBw,"}/*!sc*/ .jspkfX{display:grid;column-gap:2rem;justify-content:center;row-gap:2rem;margin:0.5rem;}/*!sc*/ @media (min-width:900px){.jspkfX{grid-template-columns:1fr 1fr;margin:0;margin-top:0.5rem;row-gap:1rem;}}/*!sc*/ data-styled.g313[id="NewsFeed__NewsFeedContainer-sc-tdxzye-0"]{content:"jspkfX,"}/*!sc*/ .ggcrMN{padding:1.375rem;}/*!sc*/ @media (min-width:900px){.ggcrMN{padding:0;}}/*!sc*/ data-styled.g323[id="BadgeSection__BoxStyled-sc-1crjmkt-0"]{content:"ggcrMN,"}/*!sc*/ .jZvPui>*+*{margin-top:2rem;}/*!sc*/ @media (min-width:900px){.jZvPui>*+*{margin-top:0;}}/*!sc*/ data-styled.g324[id="BadgeSection__RowStyled-sc-1crjmkt-1"]{content:"jZvPui,"}/*!sc*/ .dkXKWG{padding:0;}/*!sc*/ @media (min-width:900px){.dkXKWG{padding:2rem 4rem;}}/*!sc*/ @media (min-width:1200px){.dkXKWG{padding:2rem 6rem;}}/*!sc*/ data-styled.g325[id="BadgeSection__Padbox-sc-1crjmkt-2"]{content:"dkXKWG,"}/*!sc*/ .fooJVE{display:flex;justify-content:center;}/*!sc*/ data-styled.g326[id="BadgeSection__BadgeWrapper-sc-1crjmkt-3"]{content:"fooJVE,"}/*!sc*/ .iJgdNJ{text-align:center;}/*!sc*/ .iJgdNJ>*+*{margin-top:2rem;}/*!sc*/ @media (min-width:900px){.iJgdNJ{text-align:left;display:flex;align-items:center;}.iJgdNJ>*+*{margin-top:0;}.iJgdNJ>*+*{margin-left:2rem;}}/*!sc*/ data-styled.g327[id="BadgeSection__ButtonsWrapper-sc-1crjmkt-4"]{content:"iJgdNJ,"}/*!sc*/ .dYnmvz{text-transform:capitalize;}/*!sc*/ data-styled.g329[id="TopIndexPathwayBreadcrumbs__StyledBreadcrumbItem-sc-rcu44e-0"]{content:"dYnmvz,"}/*!sc*/ .huriWO{padding:2rem 1.375rem 0 1.375rem;}/*!sc*/ @media (min-width:900px){.huriWO{padding:0;}}/*!sc*/ data-styled.g331[id="TopIndexPathway__BoxStyled-sc-1avwxue-0"]{content:"huriWO,"}/*!sc*/ .khevhY{padding:0 0.875rem 1rem 0.875rem;}/*!sc*/ @media (min-width:1200px){.khevhY{padding:0px 4rem;}}/*!sc*/ data-styled.g332[id="Trending__FlexListWrapper-sc-xwz4dh-0"]{content:"khevhY,"}/*!sc*/ .GfHoF{position:relative;overflow:hidden;margin-bottom:2rem;}/*!sc*/ .GfHoF>ul{display:flex;flex-direction:row;flex-wrap:wrap;justify-content:space-around;margin-left:-1px;margin-bottom:-2rem;}/*!sc*/ .GfHoF>ul>li{flex-grow:1;flex-basis:auto;margin:0.5rem 0;padding:0 0.5rem;text-align:center;position:relative;}/*!sc*/ .GfHoF>ul>li::after{content:'·';position:absolute;left:-2px;}/*!sc*/ data-styled.g333[id="Trending__FlexList-sc-xwz4dh-1"]{content:"GfHoF,"}/*!sc*/ .illzib{display:inline-block;border-radius:4px;}/*!sc*/ .illzib:hover{background-color:#E7F0FF;}/*!sc*/ data-styled.g334[id="ClaimStatusPill__Wrapper-sc-uzn87e-0"]{content:"illzib,"}/*!sc*/ .bVFiDX{align-items:center;display:flex;}/*!sc*/ @media (min-width:900px){.bVFiDX{padding-top:0;}}/*!sc*/ data-styled.g335[id="ClaimState__Root-sc-jehdg5-0"]{content:"bVFiDX,"}/*!sc*/ .eyTHBJ{display:-webkit-box;max-width:100%;-webkit-line-clamp:3;-webkit-box-orient:vertical;overflow:hidden;}/*!sc*/ data-styled.g336[id="CompanyDescription__TruncableParagraph-sc-qaz3dy-0"]{content:"eyTHBJ,"}/*!sc*/ .jcykde{align-items:center;color:#686868;display:flex;font-size:1.25rem;font-weight:500;transition:color 150ms;}/*!sc*/ .jcykde:hover{color:#3E85FA;}/*!sc*/ .jcykde span{margin-left:8px;}/*!sc*/ data-styled.g338[id="CompanyLinkstyled__Link-sc-1i9jz6s-1"]{content:"jcykde,"}/*!sc*/ .cXQnif{margin-left:-10px;}/*!sc*/ data-styled.g342[id="ScoresMean__ImageBox-sc-9rc74j-0"]{content:"cXQnif,"}/*!sc*/ .igmOKD{margin:0 -32px;display:flex;flex-direction:column;}/*!sc*/ @media (min-width:900px){.igmOKD{padding:2rem 0;margin:0;flex-direction:row;}.igmOKD>*+*{margin-left:1.5rem;}}/*!sc*/ data-styled.g346[id="SummaryCompanystyled__Root-sc-1j4ssk6-0"]{content:"igmOKD,"}/*!sc*/ .lmCoJg{display:flex;justify-content:center;}/*!sc*/ data-styled.g347[id="SummaryCompanystyled__LogoAndGradeContainer-sc-1j4ssk6-1"]{content:"lmCoJg,"}/*!sc*/ .jyNMfx{opacity:0;width:0;}/*!sc*/ data-styled.g348[id="SummaryCompanystyled__CompanyLogoContainer-sc-1j4ssk6-2"]{content:"jyNMfx,"}/*!sc*/ .cdRfAL{display:flex;flex-direction:column;align-items:center;}/*!sc*/ @media (min-width:900px){.cdRfAL{align-items:flex-start;justify-content:center;}}/*!sc*/ data-styled.g349[id="SummaryCompanystyled__CompanyNameAndLink-sc-1j4ssk6-3"]{content:"cdRfAL,"}/*!sc*/ .jvpdLE{color:#555555;font-size:1.75rem;font-weight:500;line-height:40px;margin:24px 0 6px;text-align:center;}/*!sc*/ @media (min-width:900px){.jvpdLE{margin:0 0 7px;font-size:2.25rem;text-align:left;}}/*!sc*/ data-styled.g351[id="SummaryCompanystyled__CompanyName-sc-1j4ssk6-5"]{content:"jvpdLE,"}/*!sc*/ .jLDPkO{margin-top:1.5rem;}/*!sc*/ @media (min-width:600px){.jLDPkO{display:flex;flex-direction:column;justify-content:center;margin-top:0;}}/*!sc*/ data-styled.g354[id="SummaryRatingText__Wrapper-sc-1ype5bt-0"]{content:"jLDPkO,"}/*!sc*/ .gjYJYY{white-space:pre-wrap;}/*!sc*/ data-styled.g355[id="SummaryRatingText__ButtonStyled-sc-1ype5bt-1"]{content:"gjYJYY,"}/*!sc*/ .jvMxGg{padding:1.5rem 0;}/*!sc*/ data-styled.g356[id="VendorInsightsstyled__Root-sc-bgwigx-0"]{content:"jvMxGg,"}/*!sc*/ .lhyQeu{color:#2a2a2a;display:flex;font-size:16px;line-height:24px;}/*!sc*/ .lhyQeu span{font-weight:700;width:8rem;}/*!sc*/ data-styled.g357[id="VendorInsightsstyled__Item-sc-bgwigx-1"]{content:"lhyQeu,"}/*!sc*/ .fGWbJE{font-size:2.625rem;line-height:2.625rem;}/*!sc*/ data-styled.g358[id="Score__CurrentScore-sc-10l630l-0"]{content:"fGWbJE,"}/*!sc*/ .iCDXWg{font-size:1.5rem;line-height:1.875rem;}/*!sc*/ data-styled.g359[id="Score__MaxScore-sc-10l630l-1"]{content:"iCDXWg,"}/*!sc*/ .kAfUAa{padding:0 2rem;display:flex;}/*!sc*/ .kAfUAa>*+*{margin-left:4rem;}/*!sc*/ data-styled.g362[id="DesktopOverview__Wrapper-sc-1b7qloo-0"]{content:"kAfUAa,"}/*!sc*/ .eiMrPW{flex:1;}/*!sc*/ data-styled.g363[id="DesktopOverview__InnerWrapper-sc-1b7qloo-1"]{content:"eiMrPW,"}/*!sc*/ .LbqDC{padding:2.5rem;}/*!sc*/ data-styled.g364[id="DesktopOverview__CardContent-sc-1b7qloo-2"]{content:"LbqDC,"}/*!sc*/ .hsEDtE{width:100%;}/*!sc*/ data-styled.g365[id="DesktopOverview__ButtonsWrapper-sc-1b7qloo-3"]{content:"hsEDtE,"}/*!sc*/ .fuAIcj{margin:0 2rem;padding:2rem;background-color:#E7F0FF;display:flex;flex-wrap:wrap;}/*!sc*/ @media screen and (max-width:900px){.fuAIcj{margin:0;}}/*!sc*/ data-styled.g375[id="indexstyled__Wrapper-sc-1oxypz3-0"]{content:"fuAIcj,"}/*!sc*/ .bTCbLh{flex:1;}/*!sc*/ .bTCbLh :nth-child(2){margin-left:4rem;}/*!sc*/ @media screen and (max-width:900px){.bTCbLh{flex-basis:100%;}.bTCbLh :nth-child(1){order:2;}.bTCbLh :nth-child(2){order:1;margin-left:0;margin-bottom:1rem;}}/*!sc*/ data-styled.g376[id="indexstyled__InnerWrapper-sc-1oxypz3-1"]{content:"bTCbLh,"}/*!sc*/ .WxsdO{margin-bottom:1rem;}/*!sc*/ data-styled.g377[id="indexstyled__Title-sc-1oxypz3-2"]{content:"WxsdO,"}/*!sc*/ .jauybD{display:block;margin-bottom:1rem;}/*!sc*/ data-styled.g378[id="indexstyled__TextContent-sc-1oxypz3-3"]{content:"jauybD,"}/*!sc*/ .ffLigq{display:flex;flex-wrap:wrap;justify-content:center;gap:2rem;margin-bottom:1rem;padding:0 2rem;}/*!sc*/ data-styled.g379[id="indexstyled__LogoContainer-sc-1oxypz3-4"]{content:"ffLigq,"}/*!sc*/ @keyframes fvtopB{from{transform:rotate(0deg);}to{transform:rotate(360deg);}}/*!sc*/ data-styled.g380[id="sc-keyframes-fvtopB"]{content:"fvtopB,"}/*!sc*/ </style><style data-href="https://use.typekit.net/peb8cdj.css">@import url("https://p.typekit.net/p.css?s=1&k=peb8cdj&ht=tk&f=139.173.175.5474.25136&a=44064139&app=typekit&e=css");@font-face{font-family:"proxima-nova";src:url("https://use.typekit.net/af/949f99/00000000000000003b9b3068/27/l?primer=7cdcb44be4a7db8877ffa5c0007b8dd865b3bbc383831fe2ea177f62257a9191&fvd=n7&v=3") format("woff2"),url("https://use.typekit.net/af/949f99/00000000000000003b9b3068/27/d?primer=7cdcb44be4a7db8877ffa5c0007b8dd865b3bbc383831fe2ea177f62257a9191&fvd=n7&v=3") format("woff"),url("https://use.typekit.net/af/949f99/00000000000000003b9b3068/27/a?primer=7cdcb44be4a7db8877ffa5c0007b8dd865b3bbc383831fe2ea177f62257a9191&fvd=n7&v=3") format("opentype");font-display:auto;font-style:normal;font-weight:700;font-stretch:normal}@font-face{font-family:"proxima-nova";src:url("https://use.typekit.net/af/576d53/00000000000000003b9b3066/27/l?primer=7cdcb44be4a7db8877ffa5c0007b8dd865b3bbc383831fe2ea177f62257a9191&fvd=n6&v=3") format("woff2"),url("https://use.typekit.net/af/576d53/00000000000000003b9b3066/27/d?primer=7cdcb44be4a7db8877ffa5c0007b8dd865b3bbc383831fe2ea177f62257a9191&fvd=n6&v=3") format("woff"),url("https://use.typekit.net/af/576d53/00000000000000003b9b3066/27/a?primer=7cdcb44be4a7db8877ffa5c0007b8dd865b3bbc383831fe2ea177f62257a9191&fvd=n6&v=3") format("opentype");font-display:auto;font-style:normal;font-weight:600;font-stretch:normal}@font-face{font-family:"proxima-nova";src:url("https://use.typekit.net/af/705e94/00000000000000003b9b3062/27/l?primer=7cdcb44be4a7db8877ffa5c0007b8dd865b3bbc383831fe2ea177f62257a9191&fvd=n4&v=3") format("woff2"),url("https://use.typekit.net/af/705e94/00000000000000003b9b3062/27/d?primer=7cdcb44be4a7db8877ffa5c0007b8dd865b3bbc383831fe2ea177f62257a9191&fvd=n4&v=3") format("woff"),url("https://use.typekit.net/af/705e94/00000000000000003b9b3062/27/a?primer=7cdcb44be4a7db8877ffa5c0007b8dd865b3bbc383831fe2ea177f62257a9191&fvd=n4&v=3") format("opentype");font-display:auto;font-style:normal;font-weight:400;font-stretch:normal}@font-face{font-family:"proxima-nova";src:url("https://use.typekit.net/af/cebe0e/00000000000000003b9b3060/27/l?primer=7cdcb44be4a7db8877ffa5c0007b8dd865b3bbc383831fe2ea177f62257a9191&fvd=n3&v=3") format("woff2"),url("https://use.typekit.net/af/cebe0e/00000000000000003b9b3060/27/d?primer=7cdcb44be4a7db8877ffa5c0007b8dd865b3bbc383831fe2ea177f62257a9191&fvd=n3&v=3") format("woff"),url("https://use.typekit.net/af/cebe0e/00000000000000003b9b3060/27/a?primer=7cdcb44be4a7db8877ffa5c0007b8dd865b3bbc383831fe2ea177f62257a9191&fvd=n3&v=3") format("opentype");font-display:auto;font-style:normal;font-weight:300;font-stretch:normal}@font-face{font-family:"proxima-nova";src:url("https://use.typekit.net/af/6e816b/00000000000000003b9b3064/27/l?primer=7cdcb44be4a7db8877ffa5c0007b8dd865b3bbc383831fe2ea177f62257a9191&fvd=n5&v=3") format("woff2"),url("https://use.typekit.net/af/6e816b/00000000000000003b9b3064/27/d?primer=7cdcb44be4a7db8877ffa5c0007b8dd865b3bbc383831fe2ea177f62257a9191&fvd=n5&v=3") format("woff"),url("https://use.typekit.net/af/6e816b/00000000000000003b9b3064/27/a?primer=7cdcb44be4a7db8877ffa5c0007b8dd865b3bbc383831fe2ea177f62257a9191&fvd=n5&v=3") format("opentype");font-display:auto;font-style:normal;font-weight:500;font-stretch:normal}.tk-proxima-nova{font-family:"proxima-nova",sans-serif}</style></head><body><noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-TQH6FX" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript><div id="__next"><header class="Header__HeaderContainer-sc-ei0f80-0 gIAiPR"><div class="sc-beySPh evGdNv ssc-ds-layout"><div class="Header__HeaderWrapper-sc-ei0f80-1 wXxou"><div class="Inline--benosd dFQcyD ssc-ds-layout"><div class="ScorecardHeader__LogoWrapper-sc-1nn98ix-0 eNFFdB"><a href="https://securityscorecard.com/" title="Security Scorecard" target="_blank" rel="noopener noreferrer" class="ScorecardHeader__StyledLink-sc-1nn98ix-1 cKWqGk"><img alt="SecurityScorecard logo" loading="lazy" decoding="async" data-nimg="fill" style="position:absolute;height:100%;width:100%;left:0;top:0;right:0;bottom:0;object-fit:contain;object-position:left center;color:transparent" src="/security-rating/_next/static/media/ssc-logo.ed089e2c.svg"/></a></div><div class="Inline--benosd hSQwnI ssc-ds-layout"><a href="https://platform.securityscorecard.io/#/" target="_blank" rel="noopener noreferrer" title="Security Scorecard - Sign in"><button class="Padbox--wdo9bk sc-dmyCSP klZKlA kGKjBV ssc-ds-layout ssc-ds-component"><div class="Inline--benosd knMBfK ssc-ds-layout">Sign In</div></button></a><a href="https://securityscorecard.com/free-account-trial/" target="_blank" rel="noopener noreferrer" title="Security Scorecard - Join now"><button class="Padbox--wdo9bk sc-dmyCSP klZKlA kGKjBV ssc-ds-layout ssc-ds-component"><div class="Inline--benosd knMBfK ssc-ds-layout">Start Free Trial</div></button></a></div></div></div></div></header><main style="flex:1 0 auto" class="Content__ContentContainer-sc-117v93n-0 jPEJxd"><div class="sc-beySPh evGdNv ssc-ds-layout"><div class="Content__ContentWrapper-sc-117v93n-1 jlpFeO"><div class="Stack--1woa0u5 kfhliI ssc-ds-layout"><section class="Section-sc-1si8ehc-0 cqrSQJ"><div class="TopIndexPathway__BoxStyled-sc-1avwxue-0 huriWO"><div class="Rowstyled__Row-sc-44tyro-0 gpyRCB"><div class="Colstyled__Col-sc-1shi1n0-0 jKVCp"><nav aria-label="Breadcrumb" class="Breadcrumbs__BreadcrumbsWrapper--1pbo2uq gOevTR ssc-ds-component"><ol class="Inline--benosd Breadcrumbs__InlineOrderedList--1erqr1o kRErYj ezDoNb ssc-ds-layout"><li class="BreadcrumbItem__ListItem--gf6fbz kIIQfi"><a color="secondary" class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS BreadcrumbItem__BreadcrumbLink--rg4cmw dqVapM TopIndexPathwayBreadcrumbs__StyledBreadcrumbItem-sc-rcu44e-0 dYnmvz" href="/security-rating">SecurityScorecard TOP 10</a></li><li aria-hidden="true" class="Breadcrumbs__IconWrapper--15qt55v dTAyEY"><svg aria-hidden="true" focusable="false" data-prefix="ssc" data-icon="angle-right" class="svg-inline--fa fa-angle-right sc-guDLey bYoByA ssc-ds-component" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 320 512"><path fill="currentColor" d="M278.6 233.4c12.5 12.5 12.5 32.8 0 45.3l-160 160c-12.5 12.5-32.8 12.5-45.3 0s-12.5-32.8 0-45.3L210.7 256 73.4 118.6c-12.5-12.5-12.5-32.8 0-45.3s32.8-12.5 45.3 0l160 160z"></path></svg></li><li class="BreadcrumbItem__ListItem--gf6fbz kIIQfi"><a color="secondary" class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS BreadcrumbItem__BreadcrumbLink--rg4cmw dqVapM TopIndexPathwayBreadcrumbs__StyledBreadcrumbItem-sc-rcu44e-0 dYnmvz" href="/security-rating/companies/information-services">Information Services</a></li><li aria-hidden="true" class="Breadcrumbs__IconWrapper--15qt55v dTAyEY"><svg aria-hidden="true" focusable="false" data-prefix="ssc" data-icon="angle-right" class="svg-inline--fa fa-angle-right sc-guDLey bYoByA ssc-ds-component" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 320 512"><path fill="currentColor" d="M278.6 233.4c12.5 12.5 12.5 32.8 0 45.3l-160 160c-12.5 12.5-32.8 12.5-45.3 0s-12.5-32.8 0-45.3L210.7 256 73.4 118.6c-12.5-12.5-12.5-32.8 0-45.3s32.8-12.5 45.3 0l160 160z"></path></svg></li><li class="BreadcrumbItem__ListItem--gf6fbz kIIQfi"><button class="Padbox--wdo9bk sc-dmyCSP klZKlA bdZqqb ssc-ds-layout ssc-ds-component BreadcrumbItem__BreadcrumbLink--rg4cmw dqVapM TopIndexPathwayBreadcrumbs__StyledBreadcrumbItem-sc-rcu44e-0 dYnmvz"><div class="Inline--benosd knMBfK ssc-ds-layout">Curity</div></button></li></ol></nav></div></div></div></section><div class="DesktopOverview__Wrapper-sc-1b7qloo-0 kAfUAa"><div class="DesktopOverview__InnerWrapper-sc-1b7qloo-1 eiMrPW"><div class="SummaryCompanystyled__Root-sc-1j4ssk6-0 igmOKD"><div class="SummaryCompanystyled__LogoAndGradeContainer-sc-1j4ssk6-1 lmCoJg"><div class="SummaryCompanystyled__CompanyLogoContainer-sc-1j4ssk6-2 jyNMfx"></div></div><div class="SummaryCompanystyled__CompanyNameAndLink-sc-1j4ssk6-3 cdRfAL"><h1 data-name="title" class="SummaryCompanystyled__CompanyName-sc-1j4ssk6-5 jvpdLE">Curity<!-- --> Security Rating</h1><a href="http://curity.io" target="_blank" rel="noopener" class="CompanyLinkstyled__Link-sc-1i9jz6s-1 jcykde"><svg width="16" height="16" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M14 10h-1c-.281 0-.5.25-.5.5V14h-10V4H7c.25 0 .5-.219.5-.5v-1c0-.25-.25-.5-.5-.5H2A1.5 1.5 0 00.5 3.5v11c0 .844.656 1.5 1.5 1.5h11a1.5 1.5 0 001.5-1.5v-4c0-.25-.25-.5-.5-.5zm1.75-10h-4c-.688 0-1.031.813-.531 1.281l1.094 1.125-7.594 7.625c-.125.125-.25.344-.25.531 0 .157.125.407.25.532l.687.687c.125.125.375.25.532.25.187 0 .406-.125.53-.25l7.626-7.594 1.125 1.094c.469.469 1.281.157 1.281-.531v-4a.76.76 0 00-.75-.75z" fill="currentColor"></path></svg><span>curity.io</span></a></div></div><div class="ClaimState__Root-sc-jehdg5-0 bVFiDX"><div class="Inline--benosd fhrUZT ssc-ds-layout"><span data-state="closed"><div class="Padbox--wdo9bk ClaimStatusPill__Wrapper-sc-uzn87e-0 hGfIdt illzib ssc-ds-layout"><div class="Inline--benosd knMBfK ssc-ds-layout"><img alt="Claimed" loading="lazy" width="24" height="24" decoding="async" data-nimg="1" style="color:transparent" src="/security-rating/_next/static/media/claimed-icon.7d993494.svg"/><span class="Text--1h8n1uh bmkJbS ssc-ds-typography">Claimed</span></div></div></span><a class="Padbox--wdo9bk sc-dmyCSP klZKlA GYVjD ssc-ds-layout ssc-ds-component" href="https://securityscorecard.com/free-account-trial/?ssc_domain=curity.io&ssc_company=Curity&ssc_cta=claim" target="_blank" rel="noreferrer noopener"><div class="Inline--benosd knMBfK ssc-ds-layout">Manage This Scorecard</div></a></div></div><div class="VendorInsightsstyled__Root-sc-bgwigx-0 jvMxGg"><ul><li class="VendorInsightsstyled__Item-sc-bgwigx-1 lhyQeu"><span>Industry</span> <!-- -->Information Services</li><li class="VendorInsightsstyled__Item-sc-bgwigx-1 lhyQeu"><span>Footprint</span> <!-- -->86 IPs</li><li class="VendorInsightsstyled__Item-sc-bgwigx-1 lhyQeu"><span>Followers</span> <!-- -->Monitored by 4 companies</li><li class="VendorInsightsstyled__Item-sc-bgwigx-1 lhyQeu"><span>Headquarters</span> <!-- -->Sweden</li><li class="VendorInsightsstyled__Item-sc-bgwigx-1 lhyQeu"><span>Year founded</span> <!-- -->2015</li><li class="VendorInsightsstyled__Item-sc-bgwigx-1 lhyQeu"><span>Employees</span> <!-- -->48</li></ul></div><div><p class="Text--1h8n1uh Paragraph--10c6bbj CompanyDescription__TruncableParagraph-sc-qaz3dy-0 jVRWeo dcreLt eyTHBJ ssc-ds-typography">Curity is a provider of customer identity and access management (CIAM) solutions. It offers authentication, user and configuration management, token-based architecture, service integrations, access control, and other solutions. The company caters to the government, financial services, healthcare, and technology sectors.</p><button class="Padbox--wdo9bk sc-dmyCSP klZKlA GYVjD ssc-ds-layout ssc-ds-component"><div class="Inline--benosd knMBfK ssc-ds-layout">Show More</div></button></div></div><div class="DesktopOverview__InnerWrapper-sc-1b7qloo-1 eiMrPW"><div class="Padbox--wdo9bk Card__CardWrapper--e9temx clHXvY gbXCMj ssc-ds-layout ssc-ds-component"><div class="Stack--1woa0u5 Card__CardStack--i59ru0 kfhksO cAYYDZ ssc-ds-layout"><div class="Stack--1woa0u5 DesktopOverview__CardContent-sc-1b7qloo-2 iFfNHY LbqDC ssc-ds-layout"><div class="Inline--benosd cSRckA ssc-ds-layout"><svg class="HexGrade__StyledSVG--1ow9nc9 knLxAg ssc-ds-component" height="128" viewBox="0 0 64 64" width="128" xmlns="http://www.w3.org/2000/svg"><path d="M 57.212 46.562 L 32.004 61.116 L 6.797 46.562 L 6.797 17.457 L 32.004 2.903 L 57.212 17.457 Z" fill="#4BBA76" stroke="#4BBA76" stroke-width="5"></path><path d="M44.0447 43L34.6127 18.988H29.3567L19.9247 43H24.7127L26.4767 38.392H37.4927L39.2567 43H44.0447ZM36.3047 34.684H27.6647L31.9847 23.236L36.3047 34.684Z" fill="#fff"></path></svg><div class="Inline--benosd fgenbc ssc-ds-layout"><span class="Text--1h8n1uh Score__CurrentScore-sc-10l630l-0 hoRixw fGWbJE ssc-ds-typography">98</span><span class="Text--1h8n1uh Score__MaxScore-sc-10l630l-1 iqqVEx iCDXWg ssc-ds-typography">/ 100</span></div></div><div class="Stack--1woa0u5 DesktopOverview__ButtonsWrapper-sc-1b7qloo-3 kfhjXT hsEDtE ssc-ds-layout"><a class="Padbox--wdo9bk sc-dmyCSP klZKlA dbiJzT ssc-ds-layout ssc-ds-component" href="https://securityscorecard.com/free-account-trial/?ssc_domain=curity.io&ssc_company=Curity&ssc_cta=primary" target="_blank" rel="noopener noreferrer"><div class="Inline--benosd knMBfK ssc-ds-layout"><svg aria-hidden="true" focusable="false" data-prefix="far" data-icon="unlock-keyhole" class="svg-inline--fa fa-unlock-keyhole sc-guDLey iBwfAu ssc-ds-component BaseButton__BaseStyledIcon--15tihwg cwjYYY" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M224 48c-44.2 0-80 35.8-80 80v64H384c35.3 0 64 28.7 64 64V448c0 35.3-28.7 64-64 64H64c-35.3 0-64-28.7-64-64V256c0-35.3 28.7-64 64-64H96V128C96 57.3 153.3 0 224 0c57 0 105.2 37.2 121.8 88.6c4.1 12.6-2.8 26.1-15.5 30.2s-26.1-2.8-30.2-15.5C289.8 71.2 259.6 48 224 48zM64 240c-8.8 0-16 7.2-16 16V448c0 8.8 7.2 16 16 16H384c8.8 0 16-7.2 16-16V256c0-8.8-7.2-16-16-16H64zM256 376H192c-13.3 0-24-10.7-24-24s10.7-24 24-24h64c13.3 0 24 10.7 24 24s-10.7 24-24 24z"></path></svg><span>Start Free Trial</span></div></a><button class="Padbox--wdo9bk sc-dmyCSP klZKlA dlbGVC ssc-ds-layout ssc-ds-component"><div class="Inline--benosd knMBfK ssc-ds-layout"><svg aria-hidden="true" focusable="false" data-prefix="far" data-icon="share" class="svg-inline--fa fa-share sc-guDLey iBwfAu ssc-ds-component BaseButton__BaseStyledIcon--15tihwg cwjYYY" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M288 240H192c-66.2 0-122 44.7-138.8 105.5C49.9 333.1 48 319.3 48 304c0-70.7 57.3-128 128-128H288h24c13.3 0 24-10.7 24-24V128 99.9L456.1 208 336 316.1V288 264c0-13.3-10.7-24-24-24H288zm0 48v48 16c0 12.6 7.4 24.1 19 29.2s25 3 34.4-5.4l160-144c6.7-6.1 10.6-14.7 10.6-23.8s-3.8-17.7-10.6-23.8l-160-144c-9.4-8.5-22.9-10.6-34.4-5.4s-19 16.6-19 29.2V80v48H240 176C78.8 128 0 206.8 0 304c0 78 38.6 126.2 68.7 152.1c4.1 3.5 8.1 6.6 11.7 9.3c3.2 2.4 6.2 4.4 8.9 6.2c4.5 3 8.3 5.1 10.8 6.5c2.5 1.4 5.3 1.9 8.1 1.9c10.9 0 19.7-8.9 19.7-19.7c0-6.8-3.6-13.2-8.3-18.1c-.5-.5-.9-.9-1.4-1.4c-2.4-2.3-5.1-5.1-7.7-8.6c-1.7-2.3-3.4-5-5-7.9c-5.3-9.7-9.5-22.9-9.5-40.2c0-53 43-96 96-96h48 48z"></path></svg><span>Share this Scorecard</span></div></button></div><div class="Padbox--wdo9bk SummaryRatingText__Wrapper-sc-1ype5bt-0 clHXvY jLDPkO ssc-ds-layout"><p class="Text--1h8n1uh Paragraph--10c6bbj jVRWeo dcreLt ssc-ds-typography"><a class="Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="https://securityscorecard.com/" target="_blank" rel="noopener noreferrer">SecurityScorecard calculates cybersecurity</a> scores based on 10 factors that reflect different cybersecurity practices and risks.</p><div><a class="Padbox--wdo9bk sc-dmyCSP klZKlA eLAUfE ssc-ds-layout ssc-ds-component SummaryRatingText__ButtonStyled-sc-1ype5bt-1 gjYJYY" href="https://securityscorecard.com/trust/" target="_blank" rel="noopener noreferrer"><div class="Inline--benosd knMBfK ssc-ds-layout">Learn more about our scoring methodology</div></a></div></div><div class="Stack--1woa0u5 kfhjXT ssc-ds-layout"><div class="ScoresMean__ImageBox-sc-9rc74j-0 cXQnif"><img alt="What do our scores mean?" loading="lazy" width="240" height="112" decoding="async" data-nimg="1" style="color:transparent" src="/security-rating/_next/static/media/breach.9bb96c83.svg"/></div><span class="Text--1h8n1uh bmkJbS ssc-ds-typography">What do our scores mean?</span><div>We learned from over <a class="Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="https://securityscorecard.com/trust/" target="_blank" rel="noopener noreferrer">12 million cybersecurity ratings</a> that companies with an F are 13.8 times more likely to be impacted by a breach versus those with an A.</div></div></div></div></div></div></div><div class="indexstyled__Wrapper-sc-1oxypz3-0 fuAIcj"><div class="indexstyled__InnerWrapper-sc-1oxypz3-1 bTCbLh"><h3 class="Heading__HeadingH3--1plv1v3 eiXfam ssc-ds-typography indexstyled__Title-sc-1oxypz3-2 WxsdO">Need to know more?</h3><span class="Text--1h8n1uh indexstyled__TextContent-sc-1oxypz3-3 hoRixw jauybD ssc-ds-typography">Ask Curity to share their security-related documents</span><a class="Padbox--wdo9bk sc-dmyCSP klZKlA eLAUfE ssc-ds-layout ssc-ds-component" href="https://platform.securityscorecard.io/#/home/?request-evidence=curity.io" target="_blank" rel="noopener noreferrer"><div class="Inline--benosd knMBfK ssc-ds-layout"><svg aria-hidden="true" focusable="false" data-prefix="far" data-icon="unlock-keyhole" class="svg-inline--fa fa-unlock-keyhole sc-guDLey iBwfAu ssc-ds-component BaseButton__BaseStyledIcon--15tihwg cwjYYY" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M224 48c-44.2 0-80 35.8-80 80v64H384c35.3 0 64 28.7 64 64V448c0 35.3-28.7 64-64 64H64c-35.3 0-64-28.7-64-64V256c0-35.3 28.7-64 64-64H96V128C96 57.3 153.3 0 224 0c57 0 105.2 37.2 121.8 88.6c4.1 12.6-2.8 26.1-15.5 30.2s-26.1-2.8-30.2-15.5C289.8 71.2 259.6 48 224 48zM64 240c-8.8 0-16 7.2-16 16V448c0 8.8 7.2 16 16 16H384c8.8 0 16-7.2 16-16V256c0-8.8-7.2-16-16-16H64zM256 376H192c-13.3 0-24-10.7-24-24s10.7-24 24-24h64c13.3 0 24 10.7 24 24s-10.7 24-24 24z"></path></svg><span>Request Documents</span></div></a></div><div class="indexstyled__InnerWrapper-sc-1oxypz3-1 bTCbLh"><div class="Padbox--wdo9bk Card__CardWrapper--e9temx clHXvY gbXCMj ssc-ds-layout ssc-ds-component"><div class="Stack--1woa0u5 Card__CardStack--i59ru0 kfhksO cAYYDZ ssc-ds-layout"><div class="Card__CardContainer--159myky gpOPLl"><div class="Inline--benosd bHKwsV ssc-ds-layout"><div class="CardHeader__TitleArea--rafb1p cBybhg"><div class="Stack--1woa0u5 kNcAzf ssc-ds-layout"><h5 class="Heading__HeadingH5--j84ufz cWvedZ ssc-ds-typography CardHeader__Title--1wlzst8 iEbwKf">Evidence Locker</h5><span class="Text--1h8n1uh CardHeader__Subtitle--b6mkb3 iqqVEx Csqzj ssc-ds-typography"></span></div></div><div class="CardHeader__ButtonsArea--9t7x0c hVYkNg"></div></div></div><div class="Card__CardContainer--159myky gpOPLl"><div class="indexstyled__LogoContainer-sc-1oxypz3-4 ffLigq"><img alt="Privacy policy logo" loading="lazy" width="80" height="80" decoding="async" data-nimg="1" style="color:transparent" src="/security-rating/_next/static/media/privacypolicy.e8729199.svg"/><img alt="AICPA SOC2 logo" loading="lazy" width="80" height="80" decoding="async" data-nimg="1" style="color:transparent" srcSet="/security-rating/_next/image?url=%2Fsecurity-rating%2F_next%2Fstatic%2Fmedia%2Faicpa.eaf60015.png&w=96&q=75 1x, /security-rating/_next/image?url=%2Fsecurity-rating%2F_next%2Fstatic%2Fmedia%2Faicpa.eaf60015.png&w=256&q=75 2x" src="/security-rating/_next/image?url=%2Fsecurity-rating%2F_next%2Fstatic%2Fmedia%2Faicpa.eaf60015.png&w=256&q=75"/><img alt="ISO 27001 logo" loading="lazy" width="80" height="80" decoding="async" data-nimg="1" style="color:transparent" srcSet="/security-rating/_next/image?url=%2Fsecurity-rating%2F_next%2Fstatic%2Fmedia%2Fiso.34ae3f0f.png&w=96&q=75 1x, /security-rating/_next/image?url=%2Fsecurity-rating%2F_next%2Fstatic%2Fmedia%2Fiso.34ae3f0f.png&w=256&q=75 2x" src="/security-rating/_next/image?url=%2Fsecurity-rating%2F_next%2Fstatic%2Fmedia%2Fiso.34ae3f0f.png&w=256&q=75"/><img alt="NIST logo" loading="lazy" width="80" height="80" decoding="async" data-nimg="1" style="color:transparent" srcSet="/security-rating/_next/image?url=%2Fsecurity-rating%2F_next%2Fstatic%2Fmedia%2Fnist.d9072d37.png&w=96&q=75 1x, /security-rating/_next/image?url=%2Fsecurity-rating%2F_next%2Fstatic%2Fmedia%2Fnist.d9072d37.png&w=256&q=75 2x" src="/security-rating/_next/image?url=%2Fsecurity-rating%2F_next%2Fstatic%2Fmedia%2Fnist.d9072d37.png&w=256&q=75"/></div></div></div></div></div></div><section data-name="latest-news" class="Section-sc-1si8ehc-0 cqrSQJ"><header class="SectionTitle__Header-sc-1le0dhy-3 iLbXcX"><h2 class="Heading__HeadingH2--1e961ka bcAibp ssc-ds-typography SectionTitle__TitleH2-sc-1le0dhy-0 fNWIqp">SecurityScorecard Badge</h2></header><div class="Colstyled__Col-sc-1shi1n0-0 jKVCp BadgeSection__BoxStyled-sc-1crjmkt-0 ggcrMN"><div class="Rowstyled__Row-sc-44tyro-0 gpyRCB BadgeSection__RowStyled-sc-1crjmkt-1 jZvPui"><div class="Colstyled__Col-sc-1shi1n0-0 bLZfII"><div class="Colstyled__Col-sc-1shi1n0-0 jKVCp BadgeSection__Padbox-sc-1crjmkt-2 dkXKWG"><div class="BadgeSection__BadgeWrapper-sc-1crjmkt-3 fooJVE"><a href="https://scores.securityscorecard.io/security-rating/curity.io?utm_medium=badge&utm_source=curity.io&utm_campaign=seal-of-trust&utm_content=https://scores.securityscorecard.io" target="_blank" rel="noopener" title="curity.io" class="Badge__Anchor-sc-at5tfa-5 dgGYLk"><div class="Badge__BoxRounded-sc-at5tfa-0 kNLBqA"><div class="Inline--benosd Badge__BoxTop-sc-at5tfa-1 eykNGy flWJBs ssc-ds-layout"><div class="Inline--benosd Badge__BoxGrade-sc-at5tfa-2 eykNGy exVJmO ssc-ds-layout"><svg class="HexGrade__StyledSVG--1ow9nc9 knLxAg ssc-ds-component" height="40" viewBox="0 0 64 64" width="40" xmlns="http://www.w3.org/2000/svg"><path d="M 57.212 46.562 L 32.004 61.116 L 6.797 46.562 L 6.797 17.457 L 32.004 2.903 L 57.212 17.457 Z" fill="#4BBA76" stroke="#4BBA76" stroke-width="5"></path><path d="M44.0447 43L34.6127 18.988H29.3567L19.9247 43H24.7127L26.4767 38.392H37.4927L39.2567 43H44.0447ZM36.3047 34.684H27.6647L31.9847 23.236L36.3047 34.684Z" fill="#fff"></path></svg></div><div class="Inline--benosd Badge__BoxLogo-sc-at5tfa-3 eykNGy gAcrMu ssc-ds-layout"><img alt="SecurityScorecard Logo" loading="lazy" width="130" height="32" decoding="async" data-nimg="1" style="color:transparent" src="/security-rating/_next/static/media/ssc-logo-badge-1.8891ced8.svg"/></div></div><div class="Inline--benosd Badge__BoxLink-sc-at5tfa-4 eykNGy dTxRyR ssc-ds-layout"><div class="Inline--benosd fhrUZS ssc-ds-layout"><span class="VisitScorecard__BoxText-sc-1pb52x9-0 dgmbOB">Visit Our Scorecard</span><svg width="17" height="16" viewBox="0 0 17 16" fill="none" xmlns="http://www.w3.org/2000/svg"><path d="M14 10H13C12.7188 10 12.5 10.25 12.5 10.5V14H2.5V4H7C7.25 4 7.5 3.78125 7.5 3.5V2.5C7.5 2.25 7.25 2 7 2H2C1.15625 2 0.5 2.6875 0.5 3.5V14.5C0.5 15.3438 1.15625 16 2 16H13C13.8125 16 14.5 15.3438 14.5 14.5V10.5C14.5 10.25 14.25 10 14 10ZM15.75 0H11.75C11.0625 0 10.7188 0.8125 11.2188 1.28125L12.3125 2.40625L4.71875 10.0312C4.59375 10.1562 4.46875 10.375 4.46875 10.5625C4.46875 10.7188 4.59375 10.9688 4.71875 11.0938L5.40625 11.7812C5.53125 11.9062 5.78125 12.0312 5.9375 12.0312C6.125 12.0312 6.34375 11.9062 6.46875 11.7812L14.0938 4.1875L15.2188 5.28125C15.6875 5.75 16.5 5.4375 16.5 4.75V0.75C16.5 0.34375 16.1562 0 15.75 0Z" fill="#6641f3"></path></svg></div></div></div></a></div></div></div><div class="Colstyled__Col-sc-1shi1n0-0 fMlNgY"><div class="Colstyled__Col-sc-1shi1n0-0 jKVCp BadgeSection__Padbox-sc-1crjmkt-2 dkXKWG"><div class="Stack--1woa0u5 kfhliI ssc-ds-layout"><p class="Text--1h8n1uh Paragraph--10c6bbj hoRixw dcreLt ssc-ds-typography">Business prospects want to know that you're maintaining a strong cybersecurity program. Show it off with a free SecurityScorecard badge.</p><div class="BadgeSection__ButtonsWrapper-sc-1crjmkt-4 iJgdNJ"><button class="Padbox--wdo9bk sc-dmyCSP klZKlA eLAUfE ssc-ds-layout ssc-ds-component"><div class="Inline--benosd knMBfK ssc-ds-layout">Add Badge</div></button><a class="Padbox--wdo9bk sc-dmyCSP klZKlA GYVjD ssc-ds-layout ssc-ds-component" href="https://support.securityscorecard.com/hc/en-us/articles/4414858473371-Showcase-your-cyber-diligence-on-your-website-with-badges" target="_blank" rel="noreferrer noopener"><div class="Inline--benosd knMBfK ssc-ds-layout">How to use badges</div></a></div></div></div></div></div></div></section><section data-name="latest-news" class="Section-sc-1si8ehc-0 cqrSQJ"><header class="SectionTitle__Header-sc-1le0dhy-3 iLbXcX"><h2 class="Heading__HeadingH2--1e961ka bcAibp ssc-ds-typography SectionTitle__TitleH2-sc-1le0dhy-0 fNWIqp">Latest news</h2></header><div class="Stack--1woa0u5 kfhliI ssc-ds-layout"><div class="NewsFeed__NewsFeedContainer-sc-tdxzye-0 jspkfX"><a href="https://www.cybersecurity-insiders.com/metrics-that-matter-for-cisos/?utm_source=rss&utm_medium=rss&utm_campaign=metrics-that-matter-for-cisos" target="_blank" rel="noreferrer"><div class="styled__NewsItemContainer-sc-16ydsc2-0 kcprqQ"><h4 class="Text--1h8n1uh styled__NewsTitle-sc-16ydsc2-1 jpeagq cuvzas ssc-ds-typography">Metrics That Matter for CISOs</h4><div class="styled__NewsSourceWrapper-sc-16ydsc2-2 fusuEh"><img alt="cybersecurity-insiders.com logo" src="/security-rating/_next/static/media/cybersecurity-insiders.com.8461a029.png" class="styled__NewsSourceLogo-sc-16ydsc2-4 bQRAuZ"/><span class="Text--1h8n1uh styled__NewsSourceName-sc-16ydsc2-5 hMaXII fGaiBw ssc-ds-typography">cybersecurity-insiders.com</span></div></div></a><a href="https://www.cybersecurity-insiders.com/business-continuity-planning-scenarios-vs-impact/?utm_source=rss&utm_medium=rss&utm_campaign=business-continuity-planning-scenarios-vs-impact" target="_blank" rel="noreferrer"><div class="styled__NewsItemContainer-sc-16ydsc2-0 kcprqQ"><h4 class="Text--1h8n1uh styled__NewsTitle-sc-16ydsc2-1 jpeagq cuvzas ssc-ds-typography">Business Continuity Planning: Scenarios vs. impact</h4><div class="styled__NewsSourceWrapper-sc-16ydsc2-2 fusuEh"><img alt="cybersecurity-insiders.com logo" src="/security-rating/_next/static/media/cybersecurity-insiders.com.8461a029.png" class="styled__NewsSourceLogo-sc-16ydsc2-4 bQRAuZ"/><span class="Text--1h8n1uh styled__NewsSourceName-sc-16ydsc2-5 hMaXII fGaiBw ssc-ds-typography">cybersecurity-insiders.com</span></div></div></a><a href="https://www.cybersecurity-insiders.com/the-new-face-of-executive-protection-why-digital-and-physical-security-can-no-longer-stand-alone/?utm_source=rss&utm_medium=rss&utm_campaign=the-new-face-of-executive-protection-why-digital-and-physical-security-can-no-longer-stand-alone" target="_blank" rel="noreferrer"><div class="styled__NewsItemContainer-sc-16ydsc2-0 kcprqQ"><h4 class="Text--1h8n1uh styled__NewsTitle-sc-16ydsc2-1 jpeagq cuvzas ssc-ds-typography">The New Face of Executive Protection: Why Digital and Physical Security Can No Longer Stand Alone</h4><div class="styled__NewsSourceWrapper-sc-16ydsc2-2 fusuEh"><img alt="cybersecurity-insiders.com logo" src="/security-rating/_next/static/media/cybersecurity-insiders.com.8461a029.png" class="styled__NewsSourceLogo-sc-16ydsc2-4 bQRAuZ"/><span class="Text--1h8n1uh styled__NewsSourceName-sc-16ydsc2-5 hMaXII fGaiBw ssc-ds-typography">cybersecurity-insiders.com</span></div></div></a><a href="https://www.cybersecurity-insiders.com/ais-high-stakes-gamble-balancing-breakthroughs-with-unseen-risks/?utm_source=rss&utm_medium=rss&utm_campaign=ais-high-stakes-gamble-balancing-breakthroughs-with-unseen-risks" target="_blank" rel="noreferrer"><div class="styled__NewsItemContainer-sc-16ydsc2-0 kcprqQ"><h4 class="Text--1h8n1uh styled__NewsTitle-sc-16ydsc2-1 jpeagq cuvzas ssc-ds-typography">AI’s High-Stakes Gamble: Balancing Breakthroughs with Unseen Risks</h4><div class="styled__NewsSourceWrapper-sc-16ydsc2-2 fusuEh"><img alt="cybersecurity-insiders.com logo" src="/security-rating/_next/static/media/cybersecurity-insiders.com.8461a029.png" class="styled__NewsSourceLogo-sc-16ydsc2-4 bQRAuZ"/><span class="Text--1h8n1uh styled__NewsSourceName-sc-16ydsc2-5 hMaXII fGaiBw ssc-ds-typography">cybersecurity-insiders.com</span></div></div></a><a href="https://www.cybersecurity-insiders.com/why-cyber-resilience-legislation-is-vital-to-safeguarding-our-networks/?utm_source=rss&utm_medium=rss&utm_campaign=why-cyber-resilience-legislation-is-vital-to-safeguarding-our-networks" target="_blank" rel="noreferrer"><div class="styled__NewsItemContainer-sc-16ydsc2-0 kcprqQ"><h4 class="Text--1h8n1uh styled__NewsTitle-sc-16ydsc2-1 jpeagq cuvzas ssc-ds-typography">Why Cyber Resilience Legislation is Vital to Safeguarding Our Networks</h4><div class="styled__NewsSourceWrapper-sc-16ydsc2-2 fusuEh"><img alt="cybersecurity-insiders.com logo" src="/security-rating/_next/static/media/cybersecurity-insiders.com.8461a029.png" class="styled__NewsSourceLogo-sc-16ydsc2-4 bQRAuZ"/><span class="Text--1h8n1uh styled__NewsSourceName-sc-16ydsc2-5 hMaXII fGaiBw ssc-ds-typography">cybersecurity-insiders.com</span></div></div></a><a href="https://www.securityweek.com/amnesty-reveals-cellebrite-zero-day-android-exploit-on-serbian-student-activist/" target="_blank" rel="noreferrer"><div class="styled__NewsItemContainer-sc-16ydsc2-0 kcprqQ"><h4 class="Text--1h8n1uh styled__NewsTitle-sc-16ydsc2-1 jpeagq cuvzas ssc-ds-typography">Amnesty Reveals Cellebrite Zero-Day Android Exploit on Serbian Student Activist</h4><div class="styled__NewsSourceWrapper-sc-16ydsc2-2 fusuEh"><img alt="securityweek.com logo" src="/security-rating/_next/static/media/securityweek.com.0a3badcf.png" class="styled__NewsSourceLogo-sc-16ydsc2-4 bQRAuZ"/><span class="Text--1h8n1uh styled__NewsSourceName-sc-16ydsc2-5 hMaXII fGaiBw ssc-ds-typography">securityweek.com</span></div></div></a></div><div class="sc-beySPh evGdNv ssc-ds-layout"><button class="Padbox--wdo9bk sc-dmyCSP klZKlA kGKjBV ssc-ds-layout ssc-ds-component"><div class="Inline--benosd knMBfK ssc-ds-layout">Show More</div></button></div></div></section><section data-name="suggested-scorecards" class="Section-sc-1si8ehc-0 cqrSQJ"><header class="SectionTitle__Header-sc-1le0dhy-3 iLbXcX"><h2 class="Heading__HeadingH2--1e961ka bcAibp ssc-ds-typography SectionTitle__TitleH2-sc-1le0dhy-0 fNWIqp">Others in their industry</h2></header><div class="styled__GridContainer-sc-or1rvv-0 eJKTJO"><div class="styled__GridWrapper-sc-or1rvv-1 bMkseb"><div class="styled__ScorecardLoadingWrapper-sc-rlehv3-3 ekLTRt"><div class="Inline--benosd cSRckA ssc-ds-layout"><div height="16" width="16" class="Spinner--l5qmjd jyhqeA ssc-ds-component spinner"></div><span class="Text--1h8n1uh iqqVEx ssc-ds-typography">Loading...</span></div></div><div class="styled__ScorecardLoadingWrapper-sc-rlehv3-3 ekLTRt"></div><div class="styled__ScorecardLoadingWrapper-sc-rlehv3-3 ekLTRt"></div></div></div><div class="sc-beySPh evGdNv ssc-ds-layout"><div class="Padbox--wdo9bk cQPkGK ssc-ds-layout"><a class="Padbox--wdo9bk sc-dmyCSP klZKlA kGKjBV ssc-ds-layout ssc-ds-component" href="/security-rating/companies/all-industries" target="_blank"><div class="Inline--benosd knMBfK ssc-ds-layout">Explore Top Companies</div></a></div></div></section><section data-name="what-do-we-measure" class="Section-sc-1si8ehc-0 cqrSQJ"><header class="SectionTitle__Header-sc-1le0dhy-3 iLbXcX"><h2 class="Heading__HeadingH2--1e961ka bcAibp ssc-ds-typography SectionTitle__TitleH2-sc-1le0dhy-0 fNWIqp">What do we measure?</h2></header><div class="Colstyled__Col-sc-1shi1n0-0 jKVCp WhatDoWeMeasure__BoxStyled-sc-5lvce1-0 Wyszu"><div class="Rowstyled__Row-sc-44tyro-0 gpyRCB"><div class="Colstyled__Col-sc-1shi1n0-0 jKVCp WhatDoWeMeasure__LeftContainer-sc-5lvce1-1 kgbINa"><div><div class="Signals__Grid-sc-1w3chrm-2 UeUuf"><div class="Colstyled__Col-sc-1shi1n0-0 jKVCp Signals__ColArrow-sc-1w3chrm-1 bKxGGN"><div class="Rowstyled__Row-sc-44tyro-0 jSTvGt"><div class="Colstyled__Col-sc-1shi1n0-0 dulOgq"><div class="Signals__ImageWrapper-sc-1w3chrm-3 fUnGsn"><img alt="Footprint" loading="lazy" width="32" height="32" decoding="async" data-nimg="1" style="color:transparent" src="/security-rating/_next/static/media/footprint.acf0a994.svg"/></div><span class="Text--1h8n1uh Signals__TextSyled-sc-1w3chrm-0 hoRixw bkoABF ssc-ds-typography">Footprint</span></div></div></div><div class="Colstyled__Col-sc-1shi1n0-0 jKVCp Signals__ColArrow-sc-1w3chrm-1 bKxGGN"><div class="Rowstyled__Row-sc-44tyro-0 jSTvGt"><div class="Colstyled__Col-sc-1shi1n0-0 dulOgq"><div class="Signals__ImageWrapper-sc-1w3chrm-3 fUnGsn"><img alt="issue" loading="lazy" width="32" height="32" decoding="async" data-nimg="1" style="color:transparent" src="/security-rating/_next/static/media/issue.0e54b5af.svg"/></div><span class="Text--1h8n1uh Signals__TextSyled-sc-1w3chrm-0 hoRixw bkoABF ssc-ds-typography">issue</span></div></div></div><div class="Colstyled__Col-sc-1shi1n0-0 jKVCp Signals__ColArrow-sc-1w3chrm-1 bKxGGN"><div class="Rowstyled__Row-sc-44tyro-0 jSTvGt"><div class="Colstyled__Col-sc-1shi1n0-0 dulOgq"><svg class="HexGrade__StyledSVG--1ow9nc9 knLxAg ssc-ds-component" height="48" viewBox="0 0 64 64" width="48" xmlns="http://www.w3.org/2000/svg"><path d="M 57.212 46.562 L 32.004 61.116 L 6.797 46.562 L 6.797 17.457 L 32.004 2.903 L 57.212 17.457 Z" fill="transparent" stroke="#4BBA76" stroke-width="5"></path><path d="M44.0447 43L34.6127 18.988H29.3567L19.9247 43H24.7127L26.4767 38.392H37.4927L39.2567 43H44.0447ZM36.3047 34.684H27.6647L31.9847 23.236L36.3047 34.684Z" fill="#4BBA76"></path></svg><span class="Text--1h8n1uh Signals__TextSyled-sc-1w3chrm-0 hoRixw bkoABF ssc-ds-typography">factor</span></div></div></div><div class="Colstyled__Col-sc-1shi1n0-0 jKVCp Signals__ColArrow-sc-1w3chrm-1 bKxGGN"><div class="Rowstyled__Row-sc-44tyro-0 jSTvGt"><div class="Colstyled__Col-sc-1shi1n0-0 dulOgq"><svg class="HexGrade__StyledSVG--1ow9nc9 knLxAg ssc-ds-component" height="48" viewBox="0 0 64 64" width="48" xmlns="http://www.w3.org/2000/svg"><path d="M 57.212 46.562 L 32.004 61.116 L 6.797 46.562 L 6.797 17.457 L 32.004 2.903 L 57.212 17.457 Z" fill="#4BBA76" stroke="#4BBA76" stroke-width="5"></path><path d="M44.0447 43L34.6127 18.988H29.3567L19.9247 43H24.7127L26.4767 38.392H37.4927L39.2567 43H44.0447ZM36.3047 34.684H27.6647L31.9847 23.236L36.3047 34.684Z" fill="#fff"></path></svg><span class="Text--1h8n1uh Signals__TextSyled-sc-1w3chrm-0 hoRixw bkoABF ssc-ds-typography">grade</span></div></div></div></div><p class="Text--1h8n1uh Paragraph--10c6bbj hoRixw kCJaVN ssc-ds-typography">SecurityScorecard collects billions of signals each week, helping organizations see risks, get more actionable information, and respond faster to keep up with threat actors. Security teams are able to react quickly to digital criminals, respond to Zero-Day incidents faster, and reduce the risk exposure timeline.</p><a class="Padbox--wdo9bk sc-dmyCSP klZKlA GYVjD ssc-ds-layout ssc-ds-component" href="https://securityscorecard.com/trust/" target="_blank" rel="noreferrer noopener"><div class="Inline--benosd knMBfK ssc-ds-layout">Learn More About Security Signals</div></a></div></div><div class="Colstyled__Col-sc-1shi1n0-0 jKVCp WhatDoWeMeasure__RightContainer-sc-5lvce1-2 iPRoFD"><div class="WhatDoWeMeasure__ParagraphContinaer-sc-5lvce1-3 kjuJrj"><p class="Text--1h8n1uh Paragraph--10c6bbj hoRixw dcreLt ssc-ds-typography">These are some of the factors we use to calculate the overall score:</p></div><div><div class="ListIssueItems__ItemContainer-sc-15reet9-0 fINNxM"><div class="IssueItem__Container-sc-1un540i-1 bxfRed"><div class="IssueItem__IconContainer-sc-1un540i-0 bwGvws"><img alt="issue" loading="lazy" width="32" height="32" decoding="async" data-nimg="1" style="color:transparent" src="/security-rating/_next/static/media/issue.0e54b5af.svg"/></div><div class="IssueItem__TextContainer-sc-1un540i-2 bouoyj"><p class="Text--1h8n1uh Paragraph--10c6bbj hoRixw dcreLt ssc-ds-typography"><strong class="Text--1h8n1uh Text__Strong--3wy1h7 dHHMJP ssc-ds-typography">Network Security</strong></p><p class="Text--1h8n1uh Paragraph--10c6bbj hoRixw dcreLt ssc-ds-typography">Discover open access points, insecure or misconfigured SSL certificates, or database vulnerabilities.</p></div></div></div><div class="ListIssueItems__ItemContainer-sc-15reet9-0 fINNxM"><div class="IssueItem__Container-sc-1un540i-1 bxfRed"><div class="IssueItem__IconContainer-sc-1un540i-0 bwGvws"><img alt="issue" loading="lazy" width="32" height="32" decoding="async" data-nimg="1" style="color:transparent" src="/security-rating/_next/static/media/issue.0e54b5af.svg"/></div><div class="IssueItem__TextContainer-sc-1un540i-2 bouoyj"><p class="Text--1h8n1uh Paragraph--10c6bbj hoRixw dcreLt ssc-ds-typography"><strong class="Text--1h8n1uh Text__Strong--3wy1h7 dHHMJP ssc-ds-typography">Patching Cadence</strong></p><p class="Text--1h8n1uh Paragraph--10c6bbj hoRixw dcreLt ssc-ds-typography">Understand how diligently a company is patching its operating systems, services, applications, software, and hardware in a timely manner.</p></div></div></div><div class="ListIssueItems__ItemContainer-sc-15reet9-0 fINNxM"><div class="IssueItem__Container-sc-1un540i-1 bxfRed"><div class="IssueItem__IconContainer-sc-1un540i-0 bwGvws"><img alt="issue" loading="lazy" width="32" height="32" decoding="async" data-nimg="1" style="color:transparent" src="/security-rating/_next/static/media/issue.0e54b5af.svg"/></div><div class="IssueItem__TextContainer-sc-1un540i-2 bouoyj"><p class="Text--1h8n1uh Paragraph--10c6bbj hoRixw dcreLt ssc-ds-typography"><strong class="Text--1h8n1uh Text__Strong--3wy1h7 dHHMJP ssc-ds-typography">IP Reputation</strong></p><p class="Text--1h8n1uh Paragraph--10c6bbj hoRixw dcreLt ssc-ds-typography">See the quantity and duration of malware infections, along with other factors influence the overall assessment of an organization’s IP Reputation.</p></div></div></div><div class="ListIssueItems__ItemContainer-sc-15reet9-0 fINNxM"><div class="IssueItem__Container-sc-1un540i-1 bxfRed"><div class="IssueItem__IconContainer-sc-1un540i-0 bwGvws"><img alt="issue" loading="lazy" width="32" height="32" decoding="async" data-nimg="1" style="color:transparent" src="/security-rating/_next/static/media/issue.0e54b5af.svg"/></div><div class="IssueItem__TextContainer-sc-1un540i-2 bouoyj"><p class="Text--1h8n1uh Paragraph--10c6bbj hoRixw dcreLt ssc-ds-typography"><strong class="Text--1h8n1uh Text__Strong--3wy1h7 dHHMJP ssc-ds-typography">Endpoint Security</strong></p><p class="Text--1h8n1uh Paragraph--10c6bbj hoRixw dcreLt ssc-ds-typography">Understand the effectiveness of protections in place for laptops, desktops, mobile devices, and all employee devices that access that company’s network.</p></div></div></div></div></div></div></div></section><section data-name="new-to-securityscorecard" class="Section-sc-1si8ehc-0 cqrSQJ"><header class="SectionTitle__Header-sc-1le0dhy-3 iLbXcX"><div class="SectionTitle__LogoWrapper-sc-1le0dhy-2 jhRSXR"><img alt="SecurityScorecard logo emblem" loading="lazy" width="48" height="48" decoding="async" data-nimg="1" style="color:transparent" src="/security-rating/_next/static/media/ssc-logo-emblem.1c0fd5ee.svg"/></div></header><section class="NewToSecurityScorecard__ArticleContainer-sc-zfh7mc-0 iWNBkv"><div class="Card__StyledCard-sc-iqpeu9-0 kNwfQE Article__ArticleWrapper-sc-ytmzw8-0 cUJRfl"><div class="Padbox--wdo9bk Article__FullWidthPadbox-sc-ytmzw8-2 cQPkGK koHahL ssc-ds-layout"><div class="Stack--1woa0u5 kfhjXT ssc-ds-layout"><h4 class="Heading__HeadingH4--6ftza9 cfktZQ ssc-ds-typography Article__Title-sc-ytmzw8-1 hVLvSY">How is your Scorecard calculated?</h4><p class="Text--1h8n1uh Paragraph--10c6bbj hoRixw dcreLt ssc-ds-typography">Take a look at the 10 factor categories at the core of SecurityScorecard’s cybersecurity rating methodology.</p></div><footer class="Article__Footer-sc-ytmzw8-3 iSREHL"><a href="https://securityscorecard.com/trust/" target="_blank" rel="noopener noreferrer"><button class="Padbox--wdo9bk sc-dmyCSP klZKlA GYVjD ssc-ds-layout ssc-ds-component"><div class="Inline--benosd knMBfK ssc-ds-layout">Visit Our Trust Portal</div></button></a></footer></div></div><div class="Card__StyledCard-sc-iqpeu9-0 kNwfQE Article__ArticleWrapper-sc-ytmzw8-0 cUJRfl"><div class="Padbox--wdo9bk Article__FullWidthPadbox-sc-ytmzw8-2 cQPkGK koHahL ssc-ds-layout"><div class="Stack--1woa0u5 kfhjXT ssc-ds-layout"><h4 class="Heading__HeadingH4--6ftza9 cfktZQ ssc-ds-typography Article__Title-sc-ytmzw8-1 hVLvSY">Embed security into your company DNA</h4><p class="Text--1h8n1uh Paragraph--10c6bbj hoRixw dcreLt ssc-ds-typography">Cyber risk ratings influence business activity from the loading dock to the board room. Learn all how to incorporate security ratings insights into workflows throughout your organization</p></div><footer class="Article__Footer-sc-ytmzw8-3 iSREHL"><a href="https://securityscorecard.com/request-a-demo" target="_blank" rel="noopener noreferrer"><button class="Padbox--wdo9bk sc-dmyCSP klZKlA GYVjD ssc-ds-layout ssc-ds-component"><div class="Inline--benosd knMBfK ssc-ds-layout">Request a Demo</div></button></a></footer></div></div><div class="Card__StyledCard-sc-iqpeu9-0 kNwfQE Article__ArticleWrapper-sc-ytmzw8-0 cUJRfl"><div class="Padbox--wdo9bk Article__FullWidthPadbox-sc-ytmzw8-2 cQPkGK koHahL ssc-ds-layout"><div class="Stack--1woa0u5 kfhjXT ssc-ds-layout"><h4 class="Heading__HeadingH4--6ftza9 cfktZQ ssc-ds-typography Article__Title-sc-ytmzw8-1 hVLvSY">Scorecards deliver real value</h4><p class="Text--1h8n1uh Paragraph--10c6bbj hoRixw dcreLt ssc-ds-typography">How do you quantify cyber risk management? Threat prevention may be hard to compute, but Forrester Consulting has done the work or you. Spoiler alert: SecurityScorecard customers realize investment payback in under a quarter.</p><p class="Text--1h8n1uh Paragraph--10c6bbj bmkJbS dcreLt ssc-ds-typography">11,000,000+ companies rated</p></div><footer class="Article__Footer-sc-ytmzw8-3 iSREHL"><a href="https://securityscorecard.com/resources/analyst-reports/the-forrester-wave-cybersecurity-risk-ratings-platforms-q2-2024/" target="_blank" rel="noopener noreferrer"><button class="Padbox--wdo9bk sc-dmyCSP klZKlA GYVjD ssc-ds-layout ssc-ds-component"><div class="Inline--benosd knMBfK ssc-ds-layout">Read the Forrester Report</div></button></a></footer></div></div></section><section class="NewToSecurityScorecard__FreeReportContainer-sc-zfh7mc-1 bqpoFx"><p>Get your free Security Ratings report to see your custom score</p><a class="Padbox--wdo9bk sc-dmyCSP klZKlA kGKjBV ssc-ds-layout ssc-ds-component" href="https://securityscorecard.com/free-account-trial/" target="_blank" rel="noreferer noopener"><div class="Inline--benosd knMBfK ssc-ds-layout">Get Free Report</div></a></section></section><section data-name="latest-news" class="Section-sc-1si8ehc-0 cqrSQJ"><header class="SectionTitle__Header-sc-1le0dhy-3 iLbXcX"><h2 class="Heading__HeadingH2--1e961ka bcAibp ssc-ds-typography SectionTitle__TitleH2-sc-1le0dhy-0 fNWIqp">Trending Scorecards</h2></header><div class="Trending__FlexListWrapper-sc-xwz4dh-0 khevhY"><div class="Trending__FlexList-sc-xwz4dh-1 GfHoF"><ul><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/weavegrid.com">Weavegrid</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/electrum.co">Electrum</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/streamnative.io">StreamNative</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/152720.com">152720</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/roomkeypms.com">RSI International</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/12twenty.com">12Twenty</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/cutsolutions.com.au">Cutsolutions</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/adaresecnottingham.com">Adaresecnottingham</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/woodardcurran.com">Woodard & Curran</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/wellright.com">WellRight</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/afs.com.bh">Arab Financial Services (AFS)</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/oai.org">Ohio Aerospace Institute</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/5undergolf.com">Golf Center</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/samsic.pt">Samsic</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/3c-d.de">3c D</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/583499.com">583499</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/unova.com">Unova</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/windsorsolutions.com">Windsorsolutions</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/www.accenture.com">Accenture</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/schondros.com">Schondros</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/aballea.com">Aballea</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/www.inetum.com">Inetum</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/abbottscustard.com">Abbottscustard</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/abdullalutfi.com">Abdullalutfi</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/leachinsuranceagency.com">Leachinsuranceagency</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/2-challenge.com">2 Challenge</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/activedigital.co.uk">Activedigital</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/usd325.com">Usd325</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/78863.com">78863</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/veracitycyber.com">Veracitycyber</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/civicactions.com">Civicactions</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/tmusallc.com">Tmusallc</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/acura.com">Acura</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/superiorcommunications.com">Superior Communications</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/singtaousa.com">Singtaousa</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/livechat-files.com">Livechat Files</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/bancaubae.it">Bancaubae</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/625648.com">625648</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/sylia-stat.fr">Sylia Stat</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/wirebelt.com">Wirebelt</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/buchdruckerei24.de">Buchdruckerei24</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/symphonycorp.com">Symphony Corporation</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/actdigital.com">Actdigital</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/arenagroup.net">Arena Group Ltd</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/acpicorp.com">Acpicorp</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/unionmachine.com">Unionmachine</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/syngenta.com">Syngenta</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/acuityplatform.com">Acuityplatform</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/wisecomachine.com">Wisecomachine</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/system1research.com">System1research</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/wealdbsl.co.uk">Wealdbsl</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/edkollc.com">Edkollc</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/appliedseparations.com">Applied Separations</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/asmarq.co.jp">Asmarq</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/arnoldbros.com">Arnoldbros</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/altitudebcm.com.au">Altitudebcm</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/sp.com.au">Sp</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/addactis.com">ADDACTIS Group</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/affinityit.com">Affinityit</a></li><li><a class="NextAnchor__StyledLink-sc-rvns6e-0 jToGTS Link__LinkRoot--929tdw litgnG ssc-ds-typography" href="/security-rating/craft.bank">Craft</a></li></ul></div></div></section></div></div></div></main><footer class="Footer__FooterContainer-sc-1wok6zp-3 gRVuyk"><div class="Footer__FooterContent-sc-1wok6zp-4 ljhiNE"><div class="Footer__FooterTop-sc-1wok6zp-5 fEQjlJ"><section class="Footer__FooterAddress-sc-1wok6zp-10 grdxao"><svg role="img" aria-label="SecurityScorecard logo" width="40" height="40" fill="none" xmlns="http://www.w3.org/2000/svg"><title>SecurityScorecard logo</title><path d="m27.252 4.164-7.275 4.162-7.278 4.164V4.164L19.977 0l7.275 4.164Zm10.187 5.827.005 8.303L22.91 9.979l7.254-4.15 7.275 4.162Zm-7.275 15.834-.002 8.32 7.289-4.163-.005-8.356-7.282-4.167v8.366Zm-17.47 9.98 7.283 4.16 7.275-4.155V27.49l-14.558 8.317ZM12.7 15.82v8.328l7.278 4.162 7.275-4.153V15.82l-7.275-4.162-7.278 4.162ZM2.5 29.98l.005-8.335 14.564 8.33-7.287 4.165L2.5 29.98ZM9.787 5.83 2.512 9.993l-.005 8.324 7.28 4.166V5.83Z" fill="currentColor"></path></svg><div class="Stack--1woa0u5 ghHCJp ssc-ds-layout"><p>SecurityScorecard<!-- --> <br/>1140 Avenue of the Americas<!-- --> <br/>19th Floor<!-- --> <br/>New York, NY 10036<!-- --> <br/></p><p><a class="Link__LinkRoot--929tdw litgnG ssc-ds-typography Footer__FooterLink-sc-1wok6zp-0 dSMEFV" href="mailto:info@securityscorecard.io">info@securityscorecard.io</a></p><p><a class="Link__LinkRoot--929tdw litgnG ssc-ds-typography Footer__FooterLink-sc-1wok6zp-0 dSMEFV" href="tel:(800) 682-1707">United States: (800) 682-1707</a></p><p><a class="Link__LinkRoot--929tdw litgnG ssc-ds-typography Footer__FooterLink-sc-1wok6zp-0 dSMEFV" href="tel:+1 (646) 809-2166">International: +1 (646) 809-2166</a></p></div></section><span class="Footer__Divider-sc-1wok6zp-1 Footer__DividerTop-sc-1wok6zp-2 loiYQB gzHNdG"></span><nav class="Footer__NavigationTopFooter-sc-1wok6zp-7 hHSagS"><ul><li><a target="_blank" rel="noreferrer noopener" href="https://securityscorecard.com/platform/">Product</a></li><li><a target="_blank" rel="noreferrer noopener" href="https://securityscorecard.com/why-securityscorecard/">Solutions</a></li><li><a target="_blank" rel="noreferrer noopener" href="https://securityscorecard.com/resources/case-studies/">Customers</a></li><li><a target="_blank" rel="noreferrer noopener" href="https://securityscorecard.com/partners">Partners</a></li><li><a target="_blank" rel="noreferrer noopener" href="https://securityscorecard.com/resources">Resources</a></li><li><a target="_blank" rel="noreferrer noopener" href="https://securityscorecard.com/company">Company</a></li><li><a target="_blank" rel="noreferrer noopener" href="https://platform.securityscorecard.io/">Login</a></li><li><a target="_blank" rel="noreferrer noopener" href="https://securityscorecard.com/blog">Blog</a></li><li><a target="_blank" rel="noreferrer noopener" href="https://securityscorecard.com/company/contact-us">Contact</a></li></ul></nav></div><span class="Footer__Divider-sc-1wok6zp-1 loiYQB"></span><div class="Footer__FooterBottom-sc-1wok6zp-6 jmQRpS"><nav class="Footer__NavigationLegal-sc-1wok6zp-8 eJdDzF"><ul><li><p>© 2025 SecurityScorecard</p></li><li><a target="_blank" rel="noreferrer noopener" href="https://securityscorecard.com/eusa">Terms of Use</a></li><li><a target="_blank" rel="noreferrer noopener" href="https://securityscorecard.com/privacy-policy">Privacy Policy</a></li><li><a target="_blank" rel="noreferrer noopener" href="https://securityscorecard.com/trust/">Trust</a></li><li><a target="_blank" rel="noreferrer noopener" href="https://securityscorecard.com/patents">Patents</a></li></ul></nav><nav class="Footer__NavigationSocial-sc-1wok6zp-9 ghFnPz"><ul><li><a target="_blank" rel="noreferrer noopener" href="https://www.linkedin.com/company/security-scorecard/"><svg role="img" aria-label="Visit our Linkedin page" width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><title>Visit our Linkedin page</title><path d="M8.125 18V8.656H5.219V18h2.906zM6.656 7.406c.938 0 1.688-.781 1.688-1.718 0-.907-.75-1.657-1.688-1.657C5.75 4.031 5 4.781 5 5.688c0 .937.75 1.718 1.656 1.718zM18.97 18H19v-5.125c0-2.5-.563-4.438-3.5-4.438-1.406 0-2.344.782-2.75 1.5h-.031v-1.28H9.938V18h2.906v-4.625c0-1.219.219-2.375 1.719-2.375s1.53 1.375 1.53 2.469V18h2.876z" fill="currentColor"></path></svg></a></li><li><a target="_blank" rel="noreferrer noopener" href="https://www.facebook.com/SecScorecard/"><svg role="img" aria-label="Visit our Facebook page" width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><title>Visit our Facebook page</title><path d="M19.75 12A7.749 7.749 0 0012 4.25 7.749 7.749 0 004.25 12c0 3.875 2.813 7.094 6.531 7.656V14.25H8.812V12h1.97v-1.688c0-1.937 1.155-3.03 2.905-3.03.876 0 1.75.155 1.75.155v1.907h-.968c-.969 0-1.281.594-1.281 1.219V12h2.156L15 14.25h-1.813v5.406A7.74 7.74 0 0019.75 12z" fill="currentColor"></path></svg></a></li><li><a target="_blank" rel="noreferrer noopener" href="https://twitter.com/security_score"><svg role="img" aria-label="Visit our Twitter page" width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><title>Visit our Twitter page</title><path d="M18.344 8.75a6.952 6.952 0 001.625-1.688 6.151 6.151 0 01-1.875.5A3.206 3.206 0 0019.53 5.75a6.93 6.93 0 01-2.062.813 3.282 3.282 0 00-2.407-1.032 3.28 3.28 0 00-3.28 3.282c0 .25.03.5.093.75a9.52 9.52 0 01-6.781-3.438 3.192 3.192 0 00-.438 1.656A3.23 3.23 0 006.124 10.5c-.531-.031-1.063-.156-1.5-.406v.031a3.285 3.285 0 002.625 3.219c-.25.062-.563.125-.844.125-.218 0-.406-.031-.625-.063a3.265 3.265 0 003.063 2.281 6.597 6.597 0 01-4.063 1.407c-.281 0-.531-.032-.781-.063 1.438.938 3.156 1.469 5.031 1.469 6.031 0 9.313-4.969 9.313-9.313V8.75z" fill="currentColor"></path></svg></a></li><li><a target="_blank" rel="noreferrer noopener" href="https://www.instagram.com/securityscorecard/"><svg role="img" aria-label="Visit our Instagram page" width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><title>Visit our Instagram page</title><path d="M12 8.406c-2 0-3.594 1.625-3.594 3.594 0 2 1.594 3.594 3.594 3.594A3.594 3.594 0 0015.594 12c0-1.969-1.625-3.594-3.594-3.594zm0 5.938A2.34 2.34 0 019.656 12c0-1.281 1.031-2.313 2.344-2.313A2.307 2.307 0 0114.313 12c0 1.313-1.032 2.344-2.313 2.344zm4.563-6.063a.84.84 0 00-.844-.844.84.84 0 00-.844.844.84.84 0 00.844.844.84.84 0 00.844-.844zm2.375.844C18.875 8 18.625 7 17.813 6.187 17 5.375 16 5.125 14.874 5.063 13.719 5 10.25 5 9.094 5.063 7.969 5.125 7 5.375 6.156 6.188 5.344 7 5.094 8 5.031 9.126c-.062 1.156-.062 4.625 0 5.781.063 1.125.313 2.094 1.125 2.938.844.812 1.813 1.062 2.938 1.125 1.156.062 4.625.062 5.781 0 1.125-.063 2.125-.313 2.938-1.125.812-.844 1.062-1.813 1.125-2.938.062-1.156.062-4.625 0-5.781zm-1.5 7c-.22.625-.72 1.094-1.313 1.344-.938.375-3.125.281-4.125.281-1.031 0-3.219.094-4.125-.281a2.37 2.37 0 01-1.344-1.344c-.375-.906-.281-3.094-.281-4.125 0-1-.094-3.188.281-4.125a2.41 2.41 0 011.344-1.313c.906-.375 3.094-.28 4.125-.28 1 0 3.188-.095 4.125.28.594.22 1.063.72 1.313 1.313.375.938.28 3.125.28 4.125 0 1.031.095 3.219-.28 4.125z" fill="currentColor"></path></svg></a></li><li><a target="_blank" rel="noreferrer noopener" href="https://www.youtube.com/channel/UCbTCXVt5mJTV3eI5_m2chZQ"><svg role="img" aria-label="Visit our Youtube page" width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><title>Visit our Youtube page</title><path d="M20.156 7.906a2.126 2.126 0 00-1.5-1.531C17.313 6 12 6 12 6s-5.344 0-6.688.375a2.126 2.126 0 00-1.5 1.531c-.374 1.313-.374 4.125-.374 4.125s0 2.781.374 4.125c.188.75.782 1.313 1.5 1.5C6.657 18 12 18 12 18s5.313 0 6.656-.344a2.084 2.084 0 001.5-1.5c.375-1.343.375-4.125.375-4.125s0-2.812-.375-4.125zm-9.906 6.657V9.5l4.438 2.531-4.438 2.531z" fill="currentColor"></path></svg></a></li></ul></nav></div></div></footer></div><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{"_nextI18Next":{"initialI18nStore":{"en":{"articles":{"new_to_ssc":"New to SecurityScorecard?","free_rating_cta":"Get Free Report","free_rating_text":"Get your free Security Ratings report to see your custom score","how_is_calculated":"How is your Scorecard calculated?","take_a_look_at_the_10_factor":"Take a look at the 10 factor categories at the core of SecurityScorecard’s cybersecurity rating methodology.","visit_our_trust_portal":"Visit Our Trust Portal","embed_security":"Embed security into your company DNA","cyber_risk_ratings":"Cyber risk ratings influence business activity from the loading dock to the board room. Learn all how to incorporate security ratings insights into workflows throughout your organization","request_a_demo":"Request a Demo","companies_rated":"companies rated","scorecards_deliver_real_value":"Scorecards deliver real value","how_do_you_quantify_cyber_risk_management":"How do you quantify cyber risk management? Threat prevention may be hard to compute, but Forrester Consulting has done the work or you. Spoiler alert: SecurityScorecard customers realize investment payback in under a quarter.","read_the_forrester_report":"Read the Forrester Report"},"common":{"not_available":"not available","most_followed":"Most followed","others_in_their_industry":"Others in their industry","industry":"Industry","footprint":"Footprint","followers":"Followers","headquarters":"Headquarters","year_founded":"Year founded","employees":"Employees","show_more":"Show More","show_less":"Show Less","what_do_we_measure":"What do we measure?","latest_news":"Latest news","learn_more":"Learn more","factor":"factor","grade":"grade","issue":"issue","signals_desc":"SecurityScorecard collects billions of signals each week, helping organizations see risks, get more actionable information, and respond faster to keep up with threat actors. Security teams are able to react quickly to digital criminals, respond to Zero-Day incidents faster, and reduce the risk exposure timeline.","learn_more_about_security_signals":"Learn More About Security Signals","tags_title":"{{companyName}} Cyber Security Rating \u0026 Vendor Risk Report | SecurityScorecard","tags_description":"View {{companyName}}'s cyber security risk rating against other vendors' scores. Explore cyber risks, data breaches, and cybersecurity incidents involving {{companyName}}","tags_twitter_title":"{{companyName}} Security Score and Breaches | SecurityScorecard","top_index_tags_title":"Top Index - {{industryName}} | SecurityScorecard","top_index_tags_description":"Discover the top companies that follow best cybersecurity practices and keep great cybersecurity scores.","ssc_logo_alt":"SecurityScorecard logo","expand":"Expand","collapse":"Collapse","copy":"Copy","visit_securityscorecard":"Visit securityscorecard.com","securityscorecard_logo_emblem":"SecurityScorecard logo emblem","explore_top_companies":"Explore Top Companies"},"header":{"join":"Join Now","start_free_trial":"Start Free Trial","sign_in":"Sign In","log_in":"Log in for updates","scroll_to_top":"Click to scroll to top","link_join_title":"Security Scorecard - Join now","link_sign_in_title":"Security Scorecard - Sign in","domain_not_found":"domain not found","trust_center_title":" - Trust Center","powered_by":"Powered by SecurityScorecard"},"companyDetails":{},"scorecard":{"join":"Join now","how":"How is the score calculated?","join_platform_strong":"Join the platform","join_platform":"to claim your scorecard or learn more about this company´s cyber risk rating.","join_platform_short":"to claim your scorecard.","unclaimed":"Unclaimed","unclaimedAlt":"This scorecard is not actively managed by a representative of \u003c0\u003e{{companyName}}.\u003c/0\u003e","claimed":"Claimed","claimedAlt":"Representatives of \u003c0\u003e{{companyName}}\u003c/0\u003e have signed-in to SecurityScorecard in the past \u003c0\u003e{{number}} days\u003c/0\u003e","claimedTodayAlt":"Representatives of \u003c0\u003e{{companyName}}\u003c/0\u003e have signed-in to SecurityScorecard today","createdAlt":"Representatives of \u003c0\u003e{{companyName}}\u003c/0\u003e have signed up with SecurityScorecard.","domain_not_found":"Sorry, we couldn't find anything about","grade_not_found":"Unknown domain grade","hidden_grade":"Hidden grade","get_your_free_score":"Get Your Free Score","claim_this_scorecard":"Claim This Scorecard","manage_this_scorecard":"Manage This Scorecard","rating":"\u003c0\u003eSecurityScorecard calculates cybersecurity\u003c/0\u003e scores based on 10 factors that reflect different cybersecurity practices and risks.","rating_link":"Learn more about our scoring methodology","what_do_our_scores_mean":"What do our scores mean?","what_do_our_scores_mean_desc":"We learned from over \u003c0\u003e12 million cybersecurity ratings\u003c/0\u003e that companies with an F are 13.8 times more likely to be impacted by a breach versus those with an A.","learn_what_risks":"Learn what risks may be affecting this organization’s security rating.","explore_the_scorecard":"Explore the Scorecard","monitored_by":"Monitored by {{followers}} companies","share_this_scorecard":"Share this Scorecard","start_free_trial":"Start Free Trial"},"footer":{"terms_of_use":"Terms of use","about_us":"About us","footer_ssc":"SecurityScorecard","footer_address_1":"1140 Avenue of the Americas","footer_address_2":"19th Floor","footer_address_3":"New York, NY 10036","footer_email":"info@securityscorecard.io","footer_us_phone_prefix":"United States","footer_us_phone":"(800) 682-1707","footer_intl_phone_prefix":"International","footer_intl_phone":"+1 (646) 809-2166","copyright":"© 2022 SecurityScorecard","product":"Product","solutions":"Solutions","customers":"Customers","partners":"Partners","resources":"Resources","company":"Company","login":"Login","blog":"Blog","contact":"Contact","tos":"Terms of Use","privacy_policy":"Privacy Policy","trust":"Trust","patents":"Patents","visit_linkedin":"Visit our Linkedin page","visit_facebook":"Visit our Facebook page","visit_twitter":"Visit our Twitter page","visit_instagram":"Visit our Instagram page","visit_youtube":"Visit our Youtube page"},"about":{},"industries":{"construction":"Construction","education":"Education","energy":"Energy","entertainment":"Entertainment","financial_services":"Financial Services","food":"Food","government":"Government","healthcare":"Healthcare","hospitality":"Hospitality","legal":"Legal","manufacturing":"Manufacturing","non_profit":"Non Profit","pharmaceutical":"Pharmaceutical","retail":"Retail","technology":"Technology","telecommunications":"Telecommunications","transportation":"Transportation","unknown":"Unknown","information_services":"Information Services","home":"Home","all_industries":"All industries","insurance":"Insurance"},"issues":{"network_security":"Network Security","network_security_desc":"Discover open access points, insecure or misconfigured SSL certificates, or database vulnerabilities.","patching_cadence":"Patching Cadence","patching_cadence_desc":"Understand how diligently a company is patching its operating systems, services, applications, software, and hardware in a timely manner.","ip_reputation":"IP Reputation","ip_reputation_desc":"See the quantity and duration of malware infections, along with other factors influence the overall assessment of an organization’s IP Reputation.","endpoint_security":"Endpoint Security","endpoint_security_desc":"Understand the effectiveness of protections in place for laptops, desktops, mobile devices, and all employee devices that access that company’s network.","application_security":"Application Security","application_security_desc":"Detecting common website application vulnerabilities.","hacker_chatter":"Hacker Chatter","hacker_chatter_desc":"Monitoring hacker sites for chatter about your company.","dns_health":"DSN Health","dns_health_desc":"Detecting DNS insecure configurations and vulnerabilities.","cubit_score":"Cubit Score","cubit_score_desc":"Proprietary algorithms checking for implementation of common security best practices.","leaked_information":"Information Leak","leaked_information_desc":"Potentially confidential company information which may have been inadvertently leaked.","social_engineering":"Social Engineering","social_engineering_desc":"Measuring company awareness to a social engineering or phishing attack.","some_factors":"These are some of the factors we use to calculate the overall score:","what_do_we_measure":"What do we measure?"},"topIndex":{"hall_of_fame":"Hall of fame","how_are_companies_ranked_title":"How are companies ranked?","how_are_companies_ranked_text":"Companies are ranked based on their remediation activity and velocity of fixing issues and responding to risks.","select_industry":"Select industry","data_collection_title":"About security ratings","data_collection_text_1":"With millions of companies scored, the depth and scope of our collected data is unmatched, and our ability to validate our data increases with every new customer and follower.","data_collection_text_2":"These numbers are updated in real time, and illustrate the expansive reach of our scoring and monitoring.","companies_rated":"Companies rated","unique_companies_followed":"Unique companies followed","users_logged_into_the_platform_last_7_days":"Users logged into the platform in the last 7 days","top_10":"Top 10","show_menu":"Show menu","num_remediated_issues":"Total # of remediated issues","unique_vendors_monitored":"Unique vendors monitored","vendor_engagement_avg":"Vendor engagement avg","breached_incidents":"Total # of incidents","view_the_full_list":"View the Full List","hide_the_full_list":"Hide the Full List","performance_stats_number":"{{val, number, number_word_break}}","security_scorecard_top_10":"SecurityScorecard TOP 10","top_index_pathway_button_description":"See our picks for the top companies that showcase their good security posture through security ratings and action.","go_to_page":"Go to page","previous_100":"Previous 100","next_100":"Next 100","list_description":"We provide this list that is based on data, best practices, and security tests, to congratulate leading cybersecurity programs. Here are our picks for the top 10 companies that showcase their good security posture through security ratings and action.","global_stats":"Global stats","industry_average":"{{industry}} industry average","more_on_cybersecurity_engagement":"More on Cybersecurity Engagement","meta_metrics":"{{val, number, number_word_break}}"},"badgeSection":{"security_scorecard_badge":"SecurityScorecard Badge","add_badge_it_is_free":"Add Badge","badge_description":"Business prospects want to know that you're maintaining a strong cybersecurity program. Show it off with a free SecurityScorecard badge.","badge_snippet_description":"Embed the below code snippet to add a Seal of Trust on your website to showcase your continual commitment to a strong security posture.","preview":"preview","add_your_badge":"Add Badge to your website for {{companyName}}","badge_code_snipped_description":"Badge code snippet for {{companyName}}","how_to_use_badges":"How to use badges"},"trending":{"trending_scorecards":"Trending Scorecards"},"evidenceLocker":{"evidence_locker":"Evidence Locker","need_to_know_more":"Need to know more?","request_access_from":"Ask {{companyName}} to share their security-related documents","request_documentation":"Request Documents"},"insideOut":{"team":"Team","announcement":"Announcement","security_statement":"Security Statement"}}},"initialLocale":"en","userConfig":null},"user":{"isLogged":false},"domain":"curity.io","companiesMonitored":"11,000,000+","selfUrl":"https://scores.securityscorecard.io","platformUrl":"https://platform.securityscorecard.io/#","company":{"isClaimed":true,"grade":"A","isScored":true,"score":98,"company":"Curity","industry":"information_services","website":"curity.io","founded":2015,"headquarters":"Sweden","employees":"48","shortDescription":"Curity is a provider of customer identity and access management (CIAM) solutions.","longDescription":"Curity is a provider of customer identity and access management (CIAM) solutions. It offers authentication, user and configuration management, token-based architecture, service integrations, access control, and other solutions. The company caters to the government, financial services, healthcare, and technology sectors.","followers":4,"footprint":86},"isPublic":true,"pendoApiKey":"c18819ef-f185-46a7-6c2f-59bf376fc654","heapApiKey":"714539924","fullstoryOrgID":"35500","news":[{"title":"Metrics That Matter for CISOs","link":"https://www.cybersecurity-insiders.com/metrics-that-matter-for-cisos/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=metrics-that-matter-for-cisos","author":"Jane Devry","guid":"https://www.cybersecurity-insiders.com/metrics-that-matter-for-cisos/","pubdate":"Sat Mar 01 2025 15:28:33 GMT+0000 (Coordinated Universal Time)","source":"cybersecurity-insiders.com","summary":"\u003cp\u003eWith security budgets tightening and business leaders taking a more watchful eye toward cybersecurity, security operations leaders are increasingly looking to justify their work with key performance indicators. But the question remains: Which metrics matter most? Earning a seat at the table means talking to business leaders in a language they understand. SecOps leaders must [\u0026#8230;]\u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.cybersecurity-insiders.com/metrics-that-matter-for-cisos/\"\u003eMetrics That Matter for CISOs\u003c/a\u003e appeared first on \u003ca href=\"https://www.cybersecurity-insiders.com\"\u003eCybersecurity Insiders\u003c/a\u003e.\u003c/p\u003e"},{"title":"Business Continuity Planning: Scenarios vs. impact","link":"https://www.cybersecurity-insiders.com/business-continuity-planning-scenarios-vs-impact/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=business-continuity-planning-scenarios-vs-impact","author":"Jane Devry","guid":"https://www.cybersecurity-insiders.com/business-continuity-planning-scenarios-vs-impact/","pubdate":"Sat Mar 01 2025 14:34:13 GMT+0000 (Coordinated Universal Time)","source":"cybersecurity-insiders.com","summary":"\u003cp\u003eThe core aim of Business Continuity Planning is to ensure that an organisation can continue to deliver its products and services, minimise downtime and recover swiftly when faced with disruption. There is a fundamental question, often posed when organisations begin: “should I plan for scenarios or impacts?” For example, should we have a plan for [\u0026#8230;]\u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.cybersecurity-insiders.com/business-continuity-planning-scenarios-vs-impact/\"\u003eBusiness Continuity Planning: Scenarios vs. impact\u003c/a\u003e appeared first on \u003ca href=\"https://www.cybersecurity-insiders.com\"\u003eCybersecurity Insiders\u003c/a\u003e.\u003c/p\u003e"},{"title":"The New Face of Executive Protection: Why Digital and Physical Security Can No Longer Stand Alone","link":"https://www.cybersecurity-insiders.com/the-new-face-of-executive-protection-why-digital-and-physical-security-can-no-longer-stand-alone/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=the-new-face-of-executive-protection-why-digital-and-physical-security-can-no-longer-stand-alone","author":"Jane Devry","guid":"https://www.cybersecurity-insiders.com/the-new-face-of-executive-protection-why-digital-and-physical-security-can-no-longer-stand-alone/","pubdate":"Sat Mar 01 2025 13:39:52 GMT+0000 (Coordinated Universal Time)","source":"cybersecurity-insiders.com","summary":"\u003cp\u003eThe security landscape for corporate leaders has reached a critical inflection point. Physical threats against executives have surged by 88%, but what\u0026#8217;s even more alarming is how these threats have evolved. Today\u0026#8217;s attackers aren\u0026#8217;t just gathering intelligence online – they\u0026#8217;re weaponizing it for sophisticated, hybrid attacks that exploit the traditional divide between cyber and physical [\u0026#8230;]\u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.cybersecurity-insiders.com/the-new-face-of-executive-protection-why-digital-and-physical-security-can-no-longer-stand-alone/\"\u003eThe New Face of Executive Protection: Why Digital and Physical Security Can No Longer Stand Alone\u003c/a\u003e appeared first on \u003ca href=\"https://www.cybersecurity-insiders.com\"\u003eCybersecurity Insiders\u003c/a\u003e.\u003c/p\u003e"},{"title":"AI’s High-Stakes Gamble: Balancing Breakthroughs with Unseen Risks","link":"https://www.cybersecurity-insiders.com/ais-high-stakes-gamble-balancing-breakthroughs-with-unseen-risks/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=ais-high-stakes-gamble-balancing-breakthroughs-with-unseen-risks","author":"Jane Devry","guid":"https://www.cybersecurity-insiders.com/ais-high-stakes-gamble-balancing-breakthroughs-with-unseen-risks/","pubdate":"Sat Mar 01 2025 12:59:31 GMT+0000 (Coordinated Universal Time)","source":"cybersecurity-insiders.com","summary":"\u003cp\u003eAI is reshaping all industries in some capacity. At Swimlane, we’ve observed how generative AI and LLMs are driving real results, with 89% of organizations in our recent study reporting notable efficiency gains. However, this rapid AI adoption comes with considerable risk. As more organizations incorporate AI into their operations, there’s an urgent need for [\u0026#8230;]\u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.cybersecurity-insiders.com/ais-high-stakes-gamble-balancing-breakthroughs-with-unseen-risks/\"\u003eAI\u0026#8217;s High-Stakes Gamble: Balancing Breakthroughs with Unseen Risks\u003c/a\u003e appeared first on \u003ca href=\"https://www.cybersecurity-insiders.com\"\u003eCybersecurity Insiders\u003c/a\u003e.\u003c/p\u003e"},{"title":"Why Cyber Resilience Legislation is Vital to Safeguarding Our Networks","link":"https://www.cybersecurity-insiders.com/why-cyber-resilience-legislation-is-vital-to-safeguarding-our-networks/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=why-cyber-resilience-legislation-is-vital-to-safeguarding-our-networks","author":"Jane Devry","guid":"https://www.cybersecurity-insiders.com/why-cyber-resilience-legislation-is-vital-to-safeguarding-our-networks/","pubdate":"Sat Mar 01 2025 12:22:32 GMT+0000 (Coordinated Universal Time)","source":"cybersecurity-insiders.com","summary":"\u003cp\u003eMary Ward was a pioneer. She was considered to have a talent for drawing, researching insects and writing several books on microscopy, which made her one of the most prominent scientists in the British Isles – a novelty for a woman at the time. Another novelty was her steam-powered carriage, in which she rolled through [\u0026#8230;]\u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.cybersecurity-insiders.com/why-cyber-resilience-legislation-is-vital-to-safeguarding-our-networks/\"\u003eWhy Cyber Resilience Legislation is Vital to Safeguarding Our Networks\u003c/a\u003e appeared first on \u003ca href=\"https://www.cybersecurity-insiders.com\"\u003eCybersecurity Insiders\u003c/a\u003e.\u003c/p\u003e"},{"title":"Amnesty Reveals Cellebrite Zero-Day Android Exploit on Serbian Student Activist","link":"https://www.securityweek.com/amnesty-reveals-cellebrite-zero-day-android-exploit-on-serbian-student-activist/","author":"Ryan Naraine","guid":"https://www.securityweek.com/?p=41419","pubdate":"Fri Feb 28 2025 20:20:54 GMT+0000 (Coordinated Universal Time)","source":"securityweek.com","summary":"\u003cp\u003eAmnesty International publishes technical details on zero-day vulnerabilities exploited by Cellebrite’s mobile forensic tools to spy on a Serbian student activist.\u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.securityweek.com/amnesty-reveals-cellebrite-zero-day-android-exploit-on-serbian-student-activist/\"\u003eAmnesty Reveals Cellebrite Zero-Day Android Exploit on Serbian Student Activist\u003c/a\u003e appeared first on \u003ca href=\"https://www.securityweek.com\"\u003eSecurityWeek\u003c/a\u003e.\u003c/p\u003e"},{"title":"Amnesty Reveals Cellebrite Zero-Day Android Exploit on Serbian Student Activist","link":"https://www.securityweek.com/amnesty-reveals-cellebrite-zero-day-android-exploit-on-serbian-student-activist/","author":"Ryan Naraine","guid":"https://www.securityweek.com/?p=41419","pubdate":"Fri Feb 28 2025 20:20:54 GMT+0000 (Coordinated Universal Time)","source":"securityweek.com","summary":"\u003cp\u003eAmnesty International publishes technical details on zero-day vulnerabilities exploited by Cellebrite’s mobile forensic tools to spy on a Serbian student activist.\u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.securityweek.com/amnesty-reveals-cellebrite-zero-day-android-exploit-on-serbian-student-activist/\"\u003eAmnesty Reveals Cellebrite Zero-Day Android Exploit on Serbian Student Activist\u003c/a\u003e appeared first on \u003ca href=\"https://www.securityweek.com\"\u003eSecurityWeek\u003c/a\u003e.\u003c/p\u003e"},{"title":"Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab","link":"https://krebsonsecurity.com/2025/02/notorious-malware-spam-host-prospero-moves-to-kaspersky-lab/","author":"BrianKrebs","guid":"https://krebsonsecurity.com/?p=70525","pubdate":"Fri Feb 28 2025 20:14:58 GMT+0000 (Coordinated Universal Time)","source":"krebsonsecurity.com","summary":"One of the most notorious providers of abuse-friendly \"bulletproof\" web hosting for cybercriminals has started routing its operations through networks run by the Russian antivirus and security firm Kaspersky Lab, KrebsOnSecurity has learned."},{"title":"OT/ICS cyber threats escalate as geopolitical conflicts intensify","link":"https://www.helpnetsecurity.com/2025/02/28/dragos-2025-ot-ics-cybersecurity-report/","author":"Help Net Security","guid":"https://www.helpnetsecurity.com/?p=324331","pubdate":"Fri Feb 28 2025 15:00:31 GMT+0000 (Coordinated Universal Time)","source":"helpnetsecurity.com","summary":"\u003cp\u003eRansomware attacks against industrial organizations surged by 87% over the past year, while new malware families designed specifically for OT environments emerged. These findings highlight a troubling trend: OT systems are increasingly becoming mainstream targets, and even sophisticated threat actors use relatively unsophisticated tactics to infiltrate and disrupt industrial operations. State-sponsored groups embed themselves in critical infrastructure, while hacktivists and cybercriminals exploit known vulnerabilities, weak remote access configurations, and exposed OT assets. A persistent lack \u0026#8230; \u003ca href=\"https://www.helpnetsecurity.com/2025/02/28/dragos-2025-ot-ics-cybersecurity-report/\" rel=\"nofollow\"\u003eMore \u003cspan class=\"meta-nav\"\u003e\u0026#8594;\u003c/span\u003e\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.helpnetsecurity.com/2025/02/28/dragos-2025-ot-ics-cybersecurity-report/\"\u003eOT/ICS cyber threats escalate as geopolitical conflicts intensify\u003c/a\u003e appeared first on \u003ca href=\"https://www.helpnetsecurity.com\"\u003eHelp Net Security\u003c/a\u003e.\u003c/p\u003e"},{"title":"Gabbard Decries Britain’s Reported Demand for Apple to Provide Backdoor Access to Users’ Cloud Data","link":"https://www.securityweek.com/gabbard-decries-britains-reported-demand-for-apple-to-provide-backdoor-access-to-users-cloud-data/","author":"Associated Press","guid":"https://www.securityweek.com/?p=41416","pubdate":"Fri Feb 28 2025 14:48:16 GMT+0000 (Coordinated Universal Time)","source":"securityweek.com","summary":"\u003cp\u003eThe Director of National Intelligence said such a demand would violate Americans’ rights and raise concerns about a foreign government pressuring a U.S.-based technology company.\u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.securityweek.com/gabbard-decries-britains-reported-demand-for-apple-to-provide-backdoor-access-to-users-cloud-data/\"\u003eGabbard Decries Britain’s Reported Demand for Apple to Provide Backdoor Access to Users’ Cloud Data\u003c/a\u003e appeared first on \u003ca href=\"https://www.securityweek.com\"\u003eSecurityWeek\u003c/a\u003e.\u003c/p\u003e"},{"title":"Gabbard Decries Britain’s Reported Demand for Apple to Provide Backdoor Access to Users’ Cloud Data","link":"https://www.securityweek.com/gabbard-decries-britains-reported-demand-for-apple-to-provide-backdoor-access-to-users-cloud-data/","author":"Associated Press","guid":"https://www.securityweek.com/?p=41416","pubdate":"Fri Feb 28 2025 14:48:16 GMT+0000 (Coordinated Universal Time)","source":"securityweek.com","summary":"\u003cp\u003eThe Director of National Intelligence said such a demand would violate Americans’ rights and raise concerns about a foreign government pressuring a U.S.-based technology company.\u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.securityweek.com/gabbard-decries-britains-reported-demand-for-apple-to-provide-backdoor-access-to-users-cloud-data/\"\u003eGabbard Decries Britain’s Reported Demand for Apple to Provide Backdoor Access to Users’ Cloud Data\u003c/a\u003e appeared first on \u003ca href=\"https://www.securityweek.com\"\u003eSecurityWeek\u003c/a\u003e.\u003c/p\u003e"},{"title":"MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)","link":"https://www.helpnetsecurity.com/2025/02/28/mitre-caldera-rce-vulnerability-with-public-poc-cve-2025-27364/","author":"Zeljka Zorz","guid":"https://www.helpnetsecurity.com/?p=324581","pubdate":"Fri Feb 28 2025 14:44:08 GMT+0000 (Coordinated Universal Time)","source":"helpnetsecurity.com","summary":"\u003cp\u003eUsers of the MITRE Caldera cyber security platform have been urged to plug a critical hole (CVE-2025–27364) that may allow unauthenticated attackers to achieve remote code execution. About MITRE Caldera MITRE Caldera is a platform built on the MITRE ATT\u0026#038;CK framework and is used by cybersecurity teams for adversary emulation, to evaluate detections and defensive tools, train red and blue teamers, testing cyber ranges, and so on. It consists of a core system (including a \u0026#8230; \u003ca href=\"https://www.helpnetsecurity.com/2025/02/28/mitre-caldera-rce-vulnerability-with-public-poc-cve-2025-27364/\" rel=\"nofollow\"\u003eMore \u003cspan class=\"meta-nav\"\u003e\u0026#8594;\u003c/span\u003e\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.helpnetsecurity.com/2025/02/28/mitre-caldera-rce-vulnerability-with-public-poc-cve-2025-27364/\"\u003eMITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)\u003c/a\u003e appeared first on \u003ca href=\"https://www.helpnetsecurity.com\"\u003eHelp Net Security\u003c/a\u003e.\u003c/p\u003e"},{"title":"Fake CAPTCHA PDFs Spread Lumma Stealer via Webflow, GoDaddy, and Other Domains","link":"https://thehackernews.com/2025/02/5000-phishing-pdfs-on-260-domains.html","author":"The Hacker News","guid":"https://thehackernews.com/2025/02/5000-phishing-pdfs-on-260-domains.html","pubdate":"Fri Feb 28 2025 13:49:00 GMT+0000 (Coordinated Universal Time)","source":"thehackernews.com","summary":"Cybersecurity researchers have uncovered a widespread phishing campaign that uses fake CAPTCHA images shared via PDF documents hosted on Webflow's content delivery network (CDN) to deliver the Lumma stealer malware.\nNetskope Threat Labs said it discovered 260 unique domains hosting 5,000 phishing PDF files that redirect victims to malicious websites.\n\"The attacker uses SEO to trick victims into"},{"title":"In Other News: Krispy Kreme Breach Cost, Pwn2Own Berlin, Disney Hack Story","link":"https://www.securityweek.com/in-other-news-krispy-kreme-breach-cost-pwn2own-berlin-disney-hack-story/","author":"Eduard Kovacs","guid":"https://www.securityweek.com/?p=41415","pubdate":"Fri Feb 28 2025 13:22:27 GMT+0000 (Coordinated Universal Time)","source":"securityweek.com","summary":"\u003cp\u003eNoteworthy stories that might have slipped under the radar: Krispy Kreme data breach costs $11M, Pwn2Own moves to Berlin, the story of the 2024 Disney hack.\u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.securityweek.com/in-other-news-krispy-kreme-breach-cost-pwn2own-berlin-disney-hack-story/\"\u003eIn Other News: Krispy Kreme Breach Cost, Pwn2Own Berlin, Disney Hack Story\u003c/a\u003e appeared first on \u003ca href=\"https://www.securityweek.com\"\u003eSecurityWeek\u003c/a\u003e.\u003c/p\u003e"},{"title":"In Other News: Krispy Kreme Breach Cost, Pwn2Own Berlin, Disney Hack Story","link":"https://www.securityweek.com/in-other-news-krispy-kreme-breach-cost-pwn2own-berlin-disney-hack-story/","author":"Eduard Kovacs","guid":"https://www.securityweek.com/?p=41415","pubdate":"Fri Feb 28 2025 13:22:27 GMT+0000 (Coordinated Universal Time)","source":"securityweek.com","summary":"\u003cp\u003eNoteworthy stories that might have slipped under the radar: Krispy Kreme data breach costs $11M, Pwn2Own moves to Berlin, the story of the 2024 Disney hack.\u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.securityweek.com/in-other-news-krispy-kreme-breach-cost-pwn2own-berlin-disney-hack-story/\"\u003eIn Other News: Krispy Kreme Breach Cost, Pwn2Own Berlin, Disney Hack Story\u003c/a\u003e appeared first on \u003ca href=\"https://www.securityweek.com\"\u003eSecurityWeek\u003c/a\u003e.\u003c/p\u003e"},{"title":"OSPS Baseline: Practical security best practices for open source software projects","link":"https://www.helpnetsecurity.com/2025/02/28/osps-baseline-practical-security-best-practices-for-open-source-software-projects/","author":"Help Net Security","guid":"https://www.helpnetsecurity.com/?p=324569","pubdate":"Fri Feb 28 2025 12:35:52 GMT+0000 (Coordinated Universal Time)","source":"helpnetsecurity.com","summary":"\u003cp\u003eThe Open Source Security Foundation (OpenSSF), a cross-industry initiative by the Linux Foundation, has announced the initial release of the Open Source Project Security Baseline (OSPS Baseline), a tiered framework of security practices that evolve with the maturity of open source projects. About the OSPS Baseline The OSPS Baseline compiles existing guidance from OpenSSF and other expert groups, outlining tasks, processes, artifacts, and configurations that enhance software development and consumption security and, in general, should \u0026#8230; \u003ca href=\"https://www.helpnetsecurity.com/2025/02/28/osps-baseline-practical-security-best-practices-for-open-source-software-projects/\" rel=\"nofollow\"\u003eMore \u003cspan class=\"meta-nav\"\u003e\u0026#8594;\u003c/span\u003e\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.helpnetsecurity.com/2025/02/28/osps-baseline-practical-security-best-practices-for-open-source-software-projects/\"\u003eOSPS Baseline: Practical security best practices for open source software projects\u003c/a\u003e appeared first on \u003ca href=\"https://www.helpnetsecurity.com\"\u003eHelp Net Security\u003c/a\u003e.\u003c/p\u003e"},{"title":"Cybersecurity M\u0026A Roundup: SolarWinds Acquired for $4.4bn","link":"https://www.infosecurity-magazine.com/news/cybersecurity-ma-roundup-february/","author":null,"guid":"https://www.infosecurity-magazine.com/news/cybersecurity-ma-roundup-february/","pubdate":"Fri Feb 28 2025 12:00:00 GMT+0000 (Coordinated Universal Time)","source":"infosecurity-magazine.com","summary":"In February 2025, Sophos completed the Secureworks deal and SolarWinds went private"},{"title":"Ransomware Group Takes Credit for Lee Enterprises Attack","link":"https://www.securityweek.com/ransomware-group-takes-credit-for-lee-enterprises-attack/","author":"Eduard Kovacs","guid":"https://www.securityweek.com/?p=41413","pubdate":"Fri Feb 28 2025 11:43:30 GMT+0000 (Coordinated Universal Time)","source":"securityweek.com","summary":"\u003cp\u003eThe Qilin ransomware gang claims to have stolen 350 Gb of files from Lee Enterprises in the attack that caused newspaper disruptions.\u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.securityweek.com/ransomware-group-takes-credit-for-lee-enterprises-attack/\"\u003eRansomware Group Takes Credit for Lee Enterprises Attack\u003c/a\u003e appeared first on \u003ca href=\"https://www.securityweek.com\"\u003eSecurityWeek\u003c/a\u003e.\u003c/p\u003e"},{"title":"Ransomware Group Takes Credit for Lee Enterprises Attack","link":"https://www.securityweek.com/ransomware-group-takes-credit-for-lee-enterprises-attack/","author":"Eduard Kovacs","guid":"https://www.securityweek.com/?p=41413","pubdate":"Fri Feb 28 2025 11:43:30 GMT+0000 (Coordinated Universal Time)","source":"securityweek.com","summary":"\u003cp\u003eThe Qilin ransomware gang claims to have stolen 350 Gb of files from Lee Enterprises in the attack that caused newspaper disruptions.\u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.securityweek.com/ransomware-group-takes-credit-for-lee-enterprises-attack/\"\u003eRansomware Group Takes Credit for Lee Enterprises Attack\u003c/a\u003e appeared first on \u003ca href=\"https://www.securityweek.com\"\u003eSecurityWeek\u003c/a\u003e.\u003c/p\u003e"},{"title":"Vo1d Botnet Evolves as It Ensnares 1.6 Million Android TV Boxes","link":"https://www.securityweek.com/vo1d-botnet-evolves-as-it-ensnares-1-6-million-android-tv-boxes/","author":"Eduard Kovacs","guid":"https://www.securityweek.com/?p=41411","pubdate":"Fri Feb 28 2025 11:23:23 GMT+0000 (Coordinated Universal Time)","source":"securityweek.com","summary":"\u003cp\u003eThe Vo1d botnet is now powered by 1.6 million Android TV devices, up from 1.3 million half a year ago. \u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.securityweek.com/vo1d-botnet-evolves-as-it-ensnares-1-6-million-android-tv-boxes/\"\u003eVo1d Botnet Evolves as It Ensnares 1.6 Million Android TV Boxes\u003c/a\u003e appeared first on \u003ca href=\"https://www.securityweek.com\"\u003eSecurityWeek\u003c/a\u003e.\u003c/p\u003e"},{"title":"Vo1d Botnet Evolves as It Ensnares 1.6 Million Android TV Boxes","link":"https://www.securityweek.com/vo1d-botnet-evolves-as-it-ensnares-1-6-million-android-tv-boxes/","author":"Eduard Kovacs","guid":"https://www.securityweek.com/?p=41411","pubdate":"Fri Feb 28 2025 11:23:23 GMT+0000 (Coordinated Universal Time)","source":"securityweek.com","summary":"\u003cp\u003eThe Vo1d botnet is now powered by 1.6 million Android TV devices, up from 1.3 million half a year ago. \u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.securityweek.com/vo1d-botnet-evolves-as-it-ensnares-1-6-million-android-tv-boxes/\"\u003eVo1d Botnet Evolves as It Ensnares 1.6 Million Android TV Boxes\u003c/a\u003e appeared first on \u003ca href=\"https://www.securityweek.com\"\u003eSecurityWeek\u003c/a\u003e.\u003c/p\u003e"},{"title":"Microsoft Names Suspects in Lawsuit Against AI Hackers","link":"https://www.securityweek.com/microsoft-names-suspects-in-lawsuit-against-ai-hackers/","author":"Eduard Kovacs","guid":"https://www.securityweek.com/?p=41409","pubdate":"Fri Feb 28 2025 10:46:22 GMT+0000 (Coordinated Universal Time)","source":"securityweek.com","summary":"\u003cp\u003eIn a lawsuit targeting cybercriminals who abuse AI services, Microsoft has named individuals from Iran, the UK, China and Vietnam.\u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.securityweek.com/microsoft-names-suspects-in-lawsuit-against-ai-hackers/\"\u003eMicrosoft Names Suspects in Lawsuit Against AI Hackers\u003c/a\u003e appeared first on \u003ca href=\"https://www.securityweek.com\"\u003eSecurityWeek\u003c/a\u003e.\u003c/p\u003e"},{"title":"Microsoft Names Suspects in Lawsuit Against AI Hackers","link":"https://www.securityweek.com/microsoft-names-suspects-in-lawsuit-against-ai-hackers/","author":"Eduard Kovacs","guid":"https://www.securityweek.com/?p=41409","pubdate":"Fri Feb 28 2025 10:46:22 GMT+0000 (Coordinated Universal Time)","source":"securityweek.com","summary":"\u003cp\u003eIn a lawsuit targeting cybercriminals who abuse AI services, Microsoft has named individuals from Iran, the UK, China and Vietnam.\u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.securityweek.com/microsoft-names-suspects-in-lawsuit-against-ai-hackers/\"\u003eMicrosoft Names Suspects in Lawsuit Against AI Hackers\u003c/a\u003e appeared first on \u003ca href=\"https://www.securityweek.com\"\u003eSecurityWeek\u003c/a\u003e.\u003c/p\u003e"},{"title":"12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training","link":"https://thehackernews.com/2025/02/12000-api-keys-and-passwords-found-in.html","author":"The Hacker News","guid":"https://thehackernews.com/2025/02/12000-api-keys-and-passwords-found-in.html","pubdate":"Fri Feb 28 2025 10:24:00 GMT+0000 (Coordinated Universal Time)","source":"thehackernews.com","summary":"A dataset used to train large language models (LLMs) has been found to contain nearly 12,000 live secrets, which allow for successful authentication.\nThe findings once again highlight how hard-coded credentials pose a severe security risk to users and organizations alike, not to mention compounding the problem when LLMs end up suggesting insecure coding practices to their users.\nTruffle"},{"title":"Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus","link":"https://thehackernews.com/2025/02/sticky-werewolf-uses-undocumented.html","author":"The Hacker News","guid":"https://thehackernews.com/2025/02/sticky-werewolf-uses-undocumented.html","pubdate":"Fri Feb 28 2025 09:36:00 GMT+0000 (Coordinated Universal Time)","source":"thehackernews.com","summary":"The threat actor known as Sticky Werewolf has been linked to targeted attacks primarily in Russia and Belarus with the aim of delivering the Lumma Stealer malware by means of a previously undocumented implant.\nCybersecurity company Kaspersky is tracking the activity under the name Angry Likho, which it said bears a \"strong resemblance\" to Awaken Likho (aka Core Werewolf, GamaCopy, and"},{"title":"What is FCAPS (fault, configuration, accounting, performance and security)?","link":"https://www.techtarget.com/searchnetworking/definition/FCAPS","author":"editor@techtarget.com","guid":"https://www.techtarget.com/searchnetworking/definition/FCAPS","pubdate":"Fri Feb 28 2025 09:00:00 GMT+0000 (Coordinated Universal Time)","source":"techtarget.com","summary":null},{"title":"Cyber Attack news headlines trending on Google","link":"https://www.cybersecurity-insiders.com/cyber-attack-news-headlines-trending-on-google-53/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=cyber-attack-news-headlines-trending-on-google-53","author":"Naveen Goud","guid":"https://www.cybersecurity-insiders.com/cyber-attack-news-headlines-trending-on-google-53/","pubdate":"Fri Feb 28 2025 06:18:37 GMT+0000 (Coordinated Universal Time)","source":"cybersecurity-insiders.com","summary":"\u003cp\u003eNearly 2 Million Android TVs Infected with Malware, Triggering Cybercrime Campaigns Cybersecurity firm Xlab has recently reported that nearly 1.59 million Android-based smart TVs have been compromised by Vo1d malware, leading to the formation of a large botnet. This botnet poses a serious risk of triggering a wide-reaching cybercrime campaign in the near future. Xlab\u0026#8217;s [\u0026#8230;]\u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.cybersecurity-insiders.com/cyber-attack-news-headlines-trending-on-google-53/\"\u003eCyber Attack news headlines trending on Google\u003c/a\u003e appeared first on \u003ca href=\"https://www.cybersecurity-insiders.com\"\u003eCybersecurity Insiders\u003c/a\u003e.\u003c/p\u003e"},{"title":"Understanding the AI Act and its compliance challenges","link":"https://www.helpnetsecurity.com/2025/02/28/david-dumont-hunton-andrews-kurth-eu-ai-act-compliance/","author":"Mirko Zorz","guid":"https://www.helpnetsecurity.com/?p=324232","pubdate":"Fri Feb 28 2025 06:00:44 GMT+0000 (Coordinated Universal Time)","source":"helpnetsecurity.com","summary":"\u003cp\u003eIn this Help Net Security interview, David Dumont, Partner at Hunton Andrews Kurth, discusses the implications of the EU AI Act and how organizations can leverage existing GDPR frameworks while addressing new obligations such as conformity assessments and transparency requirements. Dumont also outlines strategies for mitigating risks from national-level enforcement variations and third-party AI vendors. The impact of the AI Act is often compared to that of the GDPR. Do you perceive any fundamental compliance \u0026#8230; \u003ca href=\"https://www.helpnetsecurity.com/2025/02/28/david-dumont-hunton-andrews-kurth-eu-ai-act-compliance/\" rel=\"nofollow\"\u003eMore \u003cspan class=\"meta-nav\"\u003e\u0026#8594;\u003c/span\u003e\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.helpnetsecurity.com/2025/02/28/david-dumont-hunton-andrews-kurth-eu-ai-act-compliance/\"\u003eUnderstanding the AI Act and its compliance challenges\u003c/a\u003e appeared first on \u003ca href=\"https://www.helpnetsecurity.com\"\u003eHelp Net Security\u003c/a\u003e.\u003c/p\u003e"},{"title":"The art of balancing data security with business goals","link":"https://www.helpnetsecurity.com/2025/02/28/business-goals-data-security-video/","author":"Help Net Security","guid":"https://www.helpnetsecurity.com/?p=323829","pubdate":"Fri Feb 28 2025 05:30:01 GMT+0000 (Coordinated Universal Time)","source":"helpnetsecurity.com","summary":"\u003cp\u003eIn this Help Net Security video, Nathan Parks, Senior Research Specialist at Gartner, discusses their recent research, revealing that only 14% of security leaders effectively balance data security with business goals. 35% of leaders are focused on securing data, while 21% prioritize using data for business objectives. Only one in seven organizations can do both effectively, risking increased vulnerability to cyber threats and operational inefficiencies. Gartner recommends that security and risk management leaders take five \u0026#8230; \u003ca href=\"https://www.helpnetsecurity.com/2025/02/28/business-goals-data-security-video/\" rel=\"nofollow\"\u003eMore \u003cspan class=\"meta-nav\"\u003e\u0026#8594;\u003c/span\u003e\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.helpnetsecurity.com/2025/02/28/business-goals-data-security-video/\"\u003eThe art of balancing data security with business goals\u003c/a\u003e appeared first on \u003ca href=\"https://www.helpnetsecurity.com\"\u003eHelp Net Security\u003c/a\u003e.\u003c/p\u003e"},{"title":"Infosec products of the month: February 2025","link":"https://www.helpnetsecurity.com/2025/02/28/infosec-products-of-the-month-february-2025/","author":"Help Net Security","guid":"https://www.helpnetsecurity.com/?p=323995","pubdate":"Fri Feb 28 2025 05:00:04 GMT+0000 (Coordinated Universal Time)","source":"helpnetsecurity.com","summary":"\u003cp\u003eHere’s a look at the most interesting products from the past month, featuring releases from: 1Password, Armor, BigID, Dynatrace, Fortinet, Legit Security, Netwrix, Nymi, Palo Alto Networks, Pangea, Privacera, Qualys, SafeBreach, Satori, Seal Security, Socure, and Veeam Software. Qualys TotalAppSec enables organizations to address risks across web applications and APIs Qualys TotalAppSec unifies API security, web application scanning, and web malware detection across on-premises to hybrid and multi-cloud environments, providing companies with a comprehensive view \u0026#8230; \u003ca href=\"https://www.helpnetsecurity.com/2025/02/28/infosec-products-of-the-month-february-2025/\" rel=\"nofollow\"\u003eMore \u003cspan class=\"meta-nav\"\u003e\u0026#8594;\u003c/span\u003e\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.helpnetsecurity.com/2025/02/28/infosec-products-of-the-month-february-2025/\"\u003eInfosec products of the month: February 2025\u003c/a\u003e appeared first on \u003ca href=\"https://www.helpnetsecurity.com\"\u003eHelp Net Security\u003c/a\u003e.\u003c/p\u003e"},{"title":"Targeted by Ransomware, Middle East Banks Shore Up Security","link":"https://www.darkreading.com/cyber-risk/targeted-ransomware-middle-east-banks-security","author":"Robert Lemos, Contributing Writer","guid":"https://www.darkreading.com/cyber-risk/targeted-ransomware-middle-east-banks-security","pubdate":"Fri Feb 28 2025 04:00:00 GMT+0000 (Coordinated Universal Time)","source":"darkreading.com","summary":"As the UAE financial sector finished up its annual cyberattack exercise, its worries about ransomware compromises and geopolitical attacks are on the rise."},{"title":"GHOSTR Hacker Linked to 90+ Data Breaches Arrested","link":"https://hackread.com/ghostr-hacker-linked-to-90-data-breaches-arrested/","author":"Waqas","guid":"https://hackread.com/?p=126582","pubdate":"Thu Feb 27 2025 23:07:01 GMT+0000 (Coordinated Universal Time)","source":"hackread.com","summary":"A hacker using the alias GHOSTR, linked to 90+ data breaches, was arrested in a joint effort by law enforcement in Thailand, Singapore, and cybersecurity firm Group-IB."},{"title":"3 Things to Know About AI Data Poisoning","link":"https://www.darkreading.com/vulnerabilities-threats/3-things-about-ai-data-poisoning","author":"Arvind Nithrakashyap","guid":"https://www.darkreading.com/vulnerabilities-threats/3-things-about-ai-data-poisoning","pubdate":"Thu Feb 27 2025 19:07:13 GMT+0000 (Coordinated Universal Time)","source":"darkreading.com","summary":"Data poisoning represents the next big existential cybersecurity threat — unless organizations can ensure their AI systems are safe and trustworthy."},{"title":"26 New Threat Groups Spotted in 2024: CrowdStrike","link":"https://www.securityweek.com/26-new-threat-groups-spotted-in-2024-crowdstrike/","author":"Eduard Kovacs","guid":"https://www.securityweek.com/?p=41406","pubdate":"Thu Feb 27 2025 19:03:06 GMT+0000 (Coordinated Universal Time)","source":"securityweek.com","summary":"\u003cp\u003eCrowdStrike has published its 2025 Global\u2028Threat Report, which warns of faster breakout time and an increase in Chinese activity. \u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.securityweek.com/26-new-threat-groups-spotted-in-2024-crowdstrike/\"\u003e26 New Threat Groups Spotted in 2024: CrowdStrike\u003c/a\u003e appeared first on \u003ca href=\"https://www.securityweek.com\"\u003eSecurityWeek\u003c/a\u003e.\u003c/p\u003e"},{"title":"26 New Threat Groups Spotted in 2024: CrowdStrike","link":"https://www.securityweek.com/26-new-threat-groups-spotted-in-2024-crowdstrike/","author":"Eduard Kovacs","guid":"https://www.securityweek.com/?p=41406","pubdate":"Thu Feb 27 2025 19:03:06 GMT+0000 (Coordinated Universal Time)","source":"securityweek.com","summary":"\u003cp\u003eCrowdStrike has published its 2025 Global\u2028Threat Report, which warns of faster breakout time and an increase in Chinese activity. \u003c/p\u003e\n\u003cp\u003eThe post \u003ca href=\"https://www.securityweek.com/26-new-threat-groups-spotted-in-2024-crowdstrike/\"\u003e26 New Threat Groups Spotted in 2024: CrowdStrike\u003c/a\u003e appeared first on \u003ca href=\"https://www.securityweek.com\"\u003eSecurityWeek\u003c/a\u003e.\u003c/p\u003e"},{"title":"Warning issued as hackers offer firms fake cybersecurity audits to break into their systems","link":"https://www.tripwire.com/state-of-security/beware-fake-cybersecurity-audits-cybercriminals-use-scams-breach-corporate","author":"Graham Cluley","guid":"https://grahamcluley.com/?p=16346721","pubdate":"Thu Feb 27 2025 18:02:54 GMT+0000 (Coordinated Universal Time)","source":"tripwire.com","summary":"Companies are being warned that malicious hackers are using a novel technique to break into businesses - by pretending to offer audits of the company's cybersecurity.\r\n\r\nRead more in my article on the Tripwire State of Security blog."}],"isNewsFeedEnabled":true,"isTopIndexEnabled":true,"isInsideOutEnabled":false,"isEvidenceLockerEnabled":true,"trendingScorecards":[{"name":"Weavegrid","domain":"weavegrid.com","followerCount":10},{"name":"Electrum","domain":"electrum.co","followerCount":8},{"name":"StreamNative","domain":"streamnative.io","followerCount":16},{"name":"152720","domain":"152720.com","followerCount":17},{"name":"RSI International","domain":"roomkeypms.com","followerCount":13},{"name":"12Twenty","domain":"12twenty.com","followerCount":30},{"name":"Cutsolutions","domain":"cutsolutions.com.au","followerCount":9},{"name":"Adaresecnottingham","domain":"adaresecnottingham.com","followerCount":15},{"name":"Woodard \u0026 Curran","domain":"woodardcurran.com","followerCount":80},{"name":"WellRight","domain":"wellright.com","followerCount":55},{"name":"Arab Financial Services (AFS)","domain":"afs.com.bh","followerCount":55},{"name":"Ohio Aerospace Institute","domain":"oai.org","followerCount":9},{"name":"Golf Center","domain":"5undergolf.com","followerCount":8},{"name":"Samsic","domain":"samsic.pt","followerCount":10},{"name":"3c D","domain":"3c-d.de","followerCount":8},{"name":"583499","domain":"583499.com","followerCount":24},{"name":"Unova","domain":"unova.com","followerCount":6},{"name":"Windsorsolutions","domain":"windsorsolutions.com","followerCount":11},{"name":"Accenture","domain":"www.accenture.com","followerCount":22},{"name":"Schondros","domain":"schondros.com","followerCount":10},{"name":"Aballea","domain":"aballea.com","followerCount":8},{"name":"Inetum","domain":"www.inetum.com","followerCount":6},{"name":"Abbottscustard","domain":"abbottscustard.com","followerCount":7},{"name":"Abdullalutfi","domain":"abdullalutfi.com","followerCount":8},{"name":"Leachinsuranceagency","domain":"leachinsuranceagency.com","followerCount":6},{"name":"2 Challenge","domain":"2-challenge.com","followerCount":9},{"name":"Activedigital","domain":"activedigital.co.uk","followerCount":75},{"name":"Usd325","domain":"usd325.com","followerCount":6},{"name":"78863","domain":"78863.com","followerCount":6},{"name":"Veracitycyber","domain":"veracitycyber.com","followerCount":7},{"name":"Civicactions","domain":"civicactions.com","followerCount":8},{"name":"Tmusallc","domain":"tmusallc.com","followerCount":7},{"name":"Acura","domain":"acura.com","followerCount":11},{"name":"Superior Communications","domain":"superiorcommunications.com","followerCount":10},{"name":"Singtaousa","domain":"singtaousa.com","followerCount":8},{"name":"Livechat Files","domain":"livechat-files.com","followerCount":13},{"name":"Bancaubae","domain":"bancaubae.it","followerCount":8},{"name":"625648","domain":"625648.com","followerCount":25},{"name":"Sylia Stat","domain":"sylia-stat.fr","followerCount":6},{"name":"Wirebelt","domain":"wirebelt.com","followerCount":8},{"name":"Buchdruckerei24","domain":"buchdruckerei24.de","followerCount":10},{"name":"Symphony Corporation","domain":"symphonycorp.com","followerCount":9},{"name":"Actdigital","domain":"actdigital.com","followerCount":6},{"name":"Arena Group Ltd","domain":"arenagroup.net","followerCount":12},{"name":"Acpicorp","domain":"acpicorp.com","followerCount":6},{"name":"Unionmachine","domain":"unionmachine.com","followerCount":7},{"name":"Syngenta","domain":"syngenta.com","followerCount":84},{"name":"Acuityplatform","domain":"acuityplatform.com","followerCount":47},{"name":"Wisecomachine","domain":"wisecomachine.com","followerCount":6},{"name":"System1research","domain":"system1research.com","followerCount":11},{"name":"Wealdbsl","domain":"wealdbsl.co.uk","followerCount":13},{"name":"Edkollc","domain":"edkollc.com","followerCount":7},{"name":"Applied Separations","domain":"appliedseparations.com","followerCount":9},{"name":"Asmarq","domain":"asmarq.co.jp","followerCount":6},{"name":"Arnoldbros","domain":"arnoldbros.com","followerCount":6},{"name":"Altitudebcm","domain":"altitudebcm.com.au","followerCount":6},{"name":"Sp","domain":"sp.com.au","followerCount":14},{"name":"ADDACTIS Group","domain":"addactis.com","followerCount":14},{"name":"Affinityit","domain":"affinityit.com","followerCount":8},{"name":"Craft","domain":"craft.bank","followerCount":6}],"scorecardProfile":{},"displayLogo":false,"staticAssetsUrl":"https://static.securityscorecard.io"},"__N_SSP":true},"page":"/[domain]","query":{"utm_medium":"badge","utm_source":"curity.io","utm_campaign":"seal-of-trust","utm_content":"https://platform.securityscorecard.io/","domain":"curity.io"},"buildId":"S3EFI6AifLDsDbaJ1QxUV","assetPrefix":"/security-rating","runtimeConfig":{"PROD_SERVICE_DOMAIN":"scores.securityscorecard.io"},"isFallback":false,"isExperimentalCompile":false,"gssp":true,"locale":"en","locales":["en"],"defaultLocale":"en","scriptLoader":[]}</script></body></html>