BitSight Technologies

Category: Content
Type: Blog Article

Generated 3 days ago

New blog articles detected

  • What Is A Security Rating?

    A BitSight Security Rating is a simple way to understand and assess the cybersecurity posture of an organization or an organization’s vendors. It helps answer a number of critical cybersecurity questions:

BitSight Technologies

Category: Content
Type: Blog Article

Generated 4 days ago

New blog articles detected

  • Uncovering the Impact of the MongoDB Vulnerability

    Over the past couple of weeks, a major issue has surfaced affecting numerous companies that use MongoDB to store their data. Those who install MongoDB on a server and use default settings are exposing their data to the internet and allowing anybody to browse the databases, download information, and erase them entirely. Many companies are unaware of the vulnerability and that their information may ...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 week ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • Using Security Ratings and the NIST Framework as a Map to Cybersecurity Maturity

    On February 12, 2013, President Barack Obama issued Executive Order 13636, “Improving Critical Infrastructure Cybersecurity,” which called for collaboration between government and the private sector to create a set of standards for organizations to identify, assess, and manage cybersecurity risk. This led to the NIST Cybersecurity Framework (CSF), a way for organizations to manage cybersecurity ri...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • Cybersecurity Risk: A Thorough Definition

    Risk is commonly defined as threat times vulnerability times consequence. This formula applies to anything that could be exposing you to danger, but when applied to cybersecurity—the unique risks individuals and businesses face as a result of using interconnected technological systems—it provides us with a great deal of insight on risk mitigation.

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 weeks ago

New blog articles detected

  • What You Need To Know About Vendor Compliance

    Merriam-Webster defines compliance as “the act or process of doing what you have been asked or ordered to do.” This, of course, is important when it comes to cybersecurity. You need to know that your vendors are willing to comply with your security requests and meet your expectations. Below, we’ve outlined the seven things your organization needs to do to ensure vendor compliance (and go beyond co...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 3 weeks ago

New blog articles detected

  • New Report: Cybersecurity In The Legal Sector

    Cyber criminals are constantly looking for new ways to gain access to sensitive information, trade secrets, or intellectual property from companies with strong security measures. But if those organizations have strong security measures in place, it can be difficult to access—unless they go through a third party. One of the most direct connections to this information is the legal industry, which is...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 3 weeks ago

BitSight Technologies

Category: Content
Type: Youtube Video

Generated 4 weeks ago

  • Protecting Your Data - BitSight CTO Stephen Boyer Interview with CNBC

    In an interview with CNBC, BitSight Technologies co-founder and CTO, Stephen Boyer, says that most large-scale cybersecurity failures - like the one that resulted in Yahoo's recently announced data breach - happen because of carelessness of victim companies. Boyer discusses the cybersecurity ratings of different industries, and shares tips for consumers and businesses to protect their data and avo...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • A View into the Dark Web

    There is a parallel universe in the cyber world known as the “Dark Web.” It’s a part of the Internet inaccessible via standard browsers or search engines, and it’s where cyber criminals share botnet kits, trade bitcoins, and recruit other hackers to carry out attacks. Over the years, the “Dark Web” has also provided an anonymous marketplace for criminals to sell information stolen from data breach...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • Don’t Ignore Law Firms: Why Cybersecurity in the Legal Sector Matters

    Vendor security is becoming a focal point of risk management for many organizations. In many ways, this trend started with the Target breach from 2013, which highlighted the extensive financial and reputational impact of a third party security breach. Gartner estimates that by 2019, the need for transparency into operational and security activities within a vendor's value network will drive demand...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • The Top 7 CIO Challenges In 2017

    In today’s security landscape, the CIO has a large and important role to fill. They must be aware of and compliant with regulations in their industry, focus on ensuring that the right security controls are in place for the organization and its vendors, and be able to consider the risks and benefits of new business processes. 

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • Driving Greater Prioritization In Vendor Risk Management

    With third parties becoming a major attack vector into organizations, BitSight is focused on enabling security and vendor risk professionals to better prioritize their efforts when it comes to identifying and monitoring cyber security risks across their vendor ecosystem.  BitSight Security Ratings customers can now prioritize issues and receive customized alerts when the aggregate performance of m...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 month ago

BitSight Technologies

Category: Content
Type: Youtube Video

Generated 1 month ago

  • How TransUnion Informs & Scales Vendor Risk Management with BitSight Technologies

    Jasper Ossentjuk, Chief Information Security Officer at TransUnion, discusses the value BitSight brings to his organization. Ossentjuk explores how BitSight helped scale TransUnion's third-party security management program by doing more with less and taking a smarter approach to vendor risk management. Learn more at www.bitsighttech.com

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • BitSight Adds Analytics to Empower Vendor Risk Decision Making

    BitSight customers can now gain greater insight into the cybersecurity risk of their vendor ecosystem and measure the efficacy of their third party cyber risk programs. BitSight’s new Portfolio Quality Dashboard generates interactive reports, allowing organizations to see a breakdown of how their third parties perform. This security performance compared side by side to all companies that have a Bi...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Analyzing The CIO's Roles & Responsibilities Regarding Cybersecurity

    The chief information officer (CIO) has traditionally owned IT security—and in recent years, cybersecurity has become a larger part of the modern CIO’s responsibility. Cybersecurity is a company-wide issue—and it’s everyone’s responsibility to manage it appropriately—but today, the CIO must act as a steward for the data and ensure that the right controls and processes are in place for data securit...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Cybersecurity In The IoT (Internet Of Things): What You Need To Know

    The “Internet of Things” (or “IoT”) is a blanket term that encompasses embedded devices that are connected online. There’s a slew of devices that fit within this category, ranging from consumer applications (like “smart” refrigerators and home automation systems), to industrial applications (like predictive maintenance and safety monitoring), to many others. 

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Calculating The Cost Of A Data Breach: Factors You Should Keep In Mind

    A recent IBM study found that the average cost of a data breach has hit $4 million—up from $3.8 million in 2015. There are countless factors that could affect the cost of a data breach in your organization, and it’s virtually impossible to predict the exact cost. You might be able to estimate a range with the help of a data breach calculator, but no single tool is perfect. 

  • Forbes Names BitSight as one of the Next Billion-Dollar Startups of 2016

    On October 19th, Forbes released its second annual list of soon-to-be billion-dollar startups. BitSight is proud to be part of this years’ list and excited about what the future holds for the company.

  • Ransomware's Impact On Government Cybersecurity

    In our most recent BitSight Insights report, we discuss the pervasive issue that is ransomware. The report states that education has the highest rate of ransomware across all industries—and government comes in second. 

  • What Is Cyber Risk and How Does It Affect Selecting Vendors?

    When using dozens, hundreds, even thousands of vendors, how safe is a company’s digital assets? According to a recent Ponemon Institute study, almost half of respondents (49%) said that they had experienced a data breach caused by a vendor that resulted in a loss and misuse of sensitive or confidential information.

  • DNS Outage Sheds Light on Service Provider Reliance and Cyber Risk Aggregation

    Written with the assistance of Dan Dahlberg, Ethan Geil, and Ross Penkala. Last Friday morning, a distributed denial of service (DDoS) attack was carried out against Dyn, a managed DNS provider that offers Internet services for Twitter, Reddit, Spotify and countless others, causing massive outages for these and many of Dyn’s other customers. As a DNS provider, Dyn translates website names into re...

  • Cybersecurity Audit Vs. Cybersecurity Assessment: Which Do You Need?

    Whether you’re a CIO or a CISO that has been asked by the board to facilitate a cybersecurity audit or you’re a member of the board and are planning to request one, it’s extremely important to know what a cybersecurity audit is and what it isn’t. You need to know precisely what is being asked of you or what you’re asking for. 

  • Technology Resiliency & Outsourcing (TRO): Familiarize Yourself

    In a recent Huffington Post article, Shared Assessments senior director Tom Garrubba discussed how third-party risk management has become an important topic to many executives and board members around the world. He recalls a conversation he had with Robin Jones, a member of the U.K.’s Financial Conduct Authority (FCA), during a conference in London. Jones expressed that his “unit [has been] paying...

  • 13% Of The Higher Education Sector Has Been Infected With Ransomware

    Hackers look at ransomware as a quick payday, so they are very opportunistic in terms of their ransomware attack strategy. They cast a wide net, but tend to focus on target industries they think are more likely to click their links.

  • Ideas For Incorporating Continuous Risk Assessment Software Into New Vendor Selection

    Onboarding third-party vendors that will have access to your network and data can have dire consequences if you don’t have the ability to gauge vendor risk.

  • Takeaways From Yahoo's 500-Million-Account Breach

    Last month, email giant Yahoo announced the compromise of 500 million user accounts—which is being called the largest breach from a single site in history. The breach compromised names, email addresses, telephone numbers, dates of birth, passwords, and some encrypted or unencrypted security questions and answers. 

BitSight Technologies

Category: Content
Type: Youtube Video

Generated 2 months ago

  • BitSight CTO Stephen Boyer Speaks on CNBC About A Massive DNS Outage

    Stephen Boyer, CTO and Co-founder of BitSight speaks on CNBC's closing bell about a massive DNS outage that affected websites such as Amazon, Twitter, Spotify, and more.

  • Identifying and Mitigating Fourth Party Cyber Risk With BitSight Discover For Enterprises

    Learn how BitSight Discover for Enterprises highlights potentially risky cloud service providers connected to any vendor. For more information, visit: https://www.bitsighttech.com/vendor-discovery ** (Music) Inspired Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/

  • Creating and Presenting Cybersecurity Metrics

    Download this full webinar here: https://info.bitsighttech.com/how-to-present-cybersecurity-to-the-board In this webinar, Jasper Osstentjuk and Richard Clarke discuss best practices for presenting cybersecurity to the board.

  • How The University of Arizona Uses BitSight

    Watch the full webinar: https://info.bitsighttech.com/mitigating-cyber-risk-with-security-ratings In this webinar Chris Schreiber, Information Security Officer for the University of Arizona how he uses BitSight Security Ratings as part of his cloud-first security strategy.

  • RSA Conference 2016 Survival Guide

    Going to the 2016 RSA Conference? We compiled a list of survival tips so you can prepare in advance. Come visit us at booth 5015 in Hall E to learn more about BitSight Security Ratings! Visit https://info.bitsighttech.com/survival-guide-for-rsa-2016 for more information.

  • Peer-To-Peer File Sharing & Botnet Infections

    Watch the full webinar: https://info.bitsighttech.com/peer-to-peer-peril-file-sharing-security-performance Mike Woodward, Program Director of Data at BitSight discusses the correlation between peer-to-peer file sharing and botnet infections.

  • SSL Vulnerabilities By Industry

    Full webinar available here: https://info.bitsighttech.com/from-signal-action-security-metrics-business-decisions In this webinar Stephen Boyer and Jay Jacobs of BitSight explain how aggregate security data can be used to make business decisions.

  • What Works for Fannie Mae's Deputy CISO to Monitor Third Parties

    Full webinar available here: https://info.bitsighttech.com/sans-what-works-fannie-mae-bitsight Chris Porter, Deputy CISO for Fannie Mae discusses how he uses BitSight Security Ratings for Vendor Risk Management.

  • BitSight Bits: Are Energy and Utilities at Risk of a Major Breach?

    Full webinar here: https://info.bitsighttech.com/which-industry-is-most-at-risk. In this webinar, Mike Woodward, Program Director of Data details the cybersecurity performance of six key industries: Finance, Federal Government, Retail, Energy and Utilities, Healthcare, and Education.

  • Jack Nichelson of Chart Industries on how he uses BitSight Security Ratings

    Jack Nichelson, Director of IT Infrastructure and Security at Chart Industries, discusses the value of BitSight Security Ratings for his organization. Nichelson describes how he uses security ratings to benchmark his security performance against industry peers, as well as identify and mitigate security incidents on his network.

  • BitSight Bits: Legal Requirements For Third Party Cyber Risk Management

    Full webinar available here: https://info.bitsighttech.com/legal-requirements-third-parties-webinar Jacob Olcott (BitSight), Lisa Sotto (Hunton & Williams LLP), and Robert Metzger (Rogers Joseph O'Donnell) discuss legal requirements for third party cyber risk management.

  • BitSight Bits: Botnets by Industry in the Verizon DBIR

    Full webinar available here: https://info.bitsighttech.com/implementing-data-drive-security-practices Bob Rudis, Data Scientist at Verizon, and Stephen Boyer CTO and CoFounder at BitSight discuss botnet data featured in the 2015 Verizon DBIR.

  • "Twice as Likely": Brought to you by BitSight

    Do you know your company's botnet grade? Register for a free demo: http://info.bitsighttech.com/2x

  • BitSight Bits: Risk Mitigation Services in Cyber Insurance

    Watch the full webinar here: https://info.bitsighttech.com/risk-mitigation-serivces-cyber-insurance-underwriting Ira Scharf, GM of Cyber Insurance at BitSight joins Tracie Grella of AIG and Neeraj Sanhi of Willis to discuss the use of risk mitigation services in cyber insurance underwriting.

  • BitSight Bit: Data Breakdown

    Watch the full webinar here: https://info.bitsighttech.com/security-ratings-by-the-numbers-webinar Mike Woodward, Program Director of Data, talks about the number of data sources, data vendors, and data processed by BitSight on a daily basis.

BitSight Technologies

Category: Content
Type: Blog Article

Generated 3 months ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 4 months ago

New blog articles detected

  • The Rising Face of Cybercrime: Ransomware

    Ransomware has been all the talk lately in the security industry- and deservedly so. These attacks have surged in the last year: hospitals, banks, and local police departments have all been infected with ransomware. Organizations have been paralyzed for days and weeks as a result of ransomware infections. In March, a MedStar Health clinic in Baltimore reportedly turned away patients and had troubl...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 4 months ago

New blog articles detected

  • How Does BitSight Work? A Look At Security Ratings & How They’re Used

    What is BitSight? BitSight’s goal is to translate complex cybersecurity issues into simple business context through the use of security ratings. In doing this, BitSight helps companies: Understand their own security performance, and the performance of their vendors, clients, and other third parties.  Continuously assess cyber risks. Make better business decisions using objective, verifiab...

  • 3 Attack Vectors That Lead To Cybersecurity Breaches

    When we talk about cybersecurity events, we often discuss “the three principles of security”—which are often abbreviated “CIA”: 

BitSight Technologies

Category: Content
Type: Blog Article

Generated 4 months ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 4 months ago

Shall we increase our level of intimacy?

42,008,621 ideas and insights to help you find what’s next.

Log in Sign up

Shall we increase our level of intimacy?

42,008,621 ideas and insights to help you find what’s next

Create Free Account

Already a user?  Log in