BitSight Technologies

Category: Content
Type: Youtube Video

Generated 5 days ago

  • How TransUnion Informs & Scales Vendor Risk Management with BitSight Technologies

    Jasper Ossentjuk, Chief Information Security Officer at TransUnion, discusses the value BitSight brings to his organization. Ossentjuk explores how BitSight helped scale TransUnion's third-party security management program by doing more with less and taking a smarter approach to vendor risk management. Learn more at www.bitsighttech.com

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • BitSight Adds Analytics to Empower Vendor Risk Decision Making

    BitSight customers can now gain greater insight into the cybersecurity risk of their vendor ecosystem and measure the efficacy of their third party cyber risk programs. BitSight’s new Portfolio Quality Dashboard generates interactive reports, allowing organizations to see a breakdown of how their third parties perform. This security performance compared side by side to all companies that have a Bi...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 week ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 weeks ago

New blog articles detected

  • Analyzing The CIO's Roles & Responsibilities Regarding Cybersecurity

    The chief information officer (CIO) has traditionally owned IT security—and in recent years, cybersecurity has become a larger part of the modern CIO’s responsibility. Cybersecurity is a company-wide issue—and it’s everyone’s responsibility to manage it appropriately—but today, the CIO must act as a steward for the data and ensure that the right controls and processes are in place for data securit...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 3 weeks ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 3 weeks ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • Cybersecurity In The IoT (Internet Of Things): What You Need To Know

    The “Internet of Things” (or “IoT”) is a blanket term that encompasses embedded devices that are connected online. There’s a slew of devices that fit within this category, ranging from consumer applications (like “smart” refrigerators and home automation systems), to industrial applications (like predictive maintenance and safety monitoring), to many others. 

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • Calculating The Cost Of A Data Breach: Factors You Should Keep In Mind

    A recent IBM study found that the average cost of a data breach has hit $4 million—up from $3.8 million in 2015. There are countless factors that could affect the cost of a data breach in your organization, and it’s virtually impossible to predict the exact cost. You might be able to estimate a range with the help of a data breach calculator, but no single tool is perfect. 

  • Forbes Names BitSight as one of the Next Billion-Dollar Startups of 2016

    On October 19th, Forbes released its second annual list of soon-to-be billion-dollar startups. BitSight is proud to be part of this years’ list and excited about what the future holds for the company.

  • Ransomware's Impact On Government Cybersecurity

    In our most recent BitSight Insights report, we discuss the pervasive issue that is ransomware. The report states that education has the highest rate of ransomware across all industries—and government comes in second. 

  • What Is Cyber Risk and How Does It Affect Selecting Vendors?

    When using dozens, hundreds, even thousands of vendors, how safe is a company’s digital assets? According to a recent Ponemon Institute study, almost half of respondents (49%) said that they had experienced a data breach caused by a vendor that resulted in a loss and misuse of sensitive or confidential information.

  • DNS Outage Sheds Light on Service Provider Reliance and Cyber Risk Aggregation

    Written with the assistance of Dan Dahlberg, Ethan Geil, and Ross Penkala. Last Friday morning, a distributed denial of service (DDoS) attack was carried out against Dyn, a managed DNS provider that offers Internet services for Twitter, Reddit, Spotify and countless others, causing massive outages for these and many of Dyn’s other customers. As a DNS provider, Dyn translates website names into re...

  • Cybersecurity Audit Vs. Cybersecurity Assessment: Which Do You Need?

    Whether you’re a CIO or a CISO that has been asked by the board to facilitate a cybersecurity audit or you’re a member of the board and are planning to request one, it’s extremely important to know what a cybersecurity audit is and what it isn’t. You need to know precisely what is being asked of you or what you’re asking for. 

  • Technology Resiliency & Outsourcing (TRO): Familiarize Yourself

    In a recent Huffington Post article, Shared Assessments senior director Tom Garrubba discussed how third-party risk management has become an important topic to many executives and board members around the world. He recalls a conversation he had with Robin Jones, a member of the U.K.’s Financial Conduct Authority (FCA), during a conference in London. Jones expressed that his “unit [has been] paying...

  • 13% Of The Higher Education Sector Has Been Infected With Ransomware

    Hackers look at ransomware as a quick payday, so they are very opportunistic in terms of their ransomware attack strategy. They cast a wide net, but tend to focus on target industries they think are more likely to click their links.

  • Ideas For Incorporating Continuous Risk Assessment Software Into New Vendor Selection

    Onboarding third-party vendors that will have access to your network and data can have dire consequences if you don’t have the ability to gauge vendor risk.

  • Takeaways From Yahoo's 500-Million-Account Breach

    Last month, email giant Yahoo announced the compromise of 500 million user accounts—which is being called the largest breach from a single site in history. The breach compromised names, email addresses, telephone numbers, dates of birth, passwords, and some encrypted or unencrypted security questions and answers. 

BitSight Technologies

Category: Content
Type: Youtube Video

Generated 1 month ago

  • BitSight CTO Stephen Boyer Speaks on CNBC About A Massive DNS Outage

    Stephen Boyer, CTO and Co-founder of BitSight speaks on CNBC's closing bell about a massive DNS outage that affected websites such as Amazon, Twitter, Spotify, and more.

  • Identifying and Mitigating Fourth Party Cyber Risk With BitSight Discover For Enterprises

    Learn how BitSight Discover for Enterprises highlights potentially risky cloud service providers connected to any vendor. For more information, visit: https://www.bitsighttech.com/vendor-discovery ** (Music) Inspired Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/

  • Creating and Presenting Cybersecurity Metrics

    Download this full webinar here: https://info.bitsighttech.com/how-to-present-cybersecurity-to-the-board In this webinar, Jasper Osstentjuk and Richard Clarke discuss best practices for presenting cybersecurity to the board.

  • How The University of Arizona Uses BitSight

    Watch the full webinar: https://info.bitsighttech.com/mitigating-cyber-risk-with-security-ratings In this webinar Chris Schreiber, Information Security Officer for the University of Arizona how he uses BitSight Security Ratings as part of his cloud-first security strategy.

  • RSA Conference 2016 Survival Guide

    Going to the 2016 RSA Conference? We compiled a list of survival tips so you can prepare in advance. Come visit us at booth 5015 in Hall E to learn more about BitSight Security Ratings! Visit https://info.bitsighttech.com/survival-guide-for-rsa-2016 for more information.

  • Peer-To-Peer File Sharing & Botnet Infections

    Watch the full webinar: https://info.bitsighttech.com/peer-to-peer-peril-file-sharing-security-performance Mike Woodward, Program Director of Data at BitSight discusses the correlation between peer-to-peer file sharing and botnet infections.

  • SSL Vulnerabilities By Industry

    Full webinar available here: https://info.bitsighttech.com/from-signal-action-security-metrics-business-decisions In this webinar Stephen Boyer and Jay Jacobs of BitSight explain how aggregate security data can be used to make business decisions.

  • What Works for Fannie Mae's Deputy CISO to Monitor Third Parties

    Full webinar available here: https://info.bitsighttech.com/sans-what-works-fannie-mae-bitsight Chris Porter, Deputy CISO for Fannie Mae discusses how he uses BitSight Security Ratings for Vendor Risk Management.

  • BitSight Bits: Are Energy and Utilities at Risk of a Major Breach?

    Full webinar here: https://info.bitsighttech.com/which-industry-is-most-at-risk. In this webinar, Mike Woodward, Program Director of Data details the cybersecurity performance of six key industries: Finance, Federal Government, Retail, Energy and Utilities, Healthcare, and Education.

  • Jack Nichelson of Chart Industries on how he uses BitSight Security Ratings

    Jack Nichelson, Director of IT Infrastructure and Security at Chart Industries, discusses the value of BitSight Security Ratings for his organization. Nichelson describes how he uses security ratings to benchmark his security performance against industry peers, as well as identify and mitigate security incidents on his network.

  • BitSight Bits: Legal Requirements For Third Party Cyber Risk Management

    Full webinar available here: https://info.bitsighttech.com/legal-requirements-third-parties-webinar Jacob Olcott (BitSight), Lisa Sotto (Hunton & Williams LLP), and Robert Metzger (Rogers Joseph O'Donnell) discuss legal requirements for third party cyber risk management.

  • BitSight Bits: Botnets by Industry in the Verizon DBIR

    Full webinar available here: https://info.bitsighttech.com/implementing-data-drive-security-practices Bob Rudis, Data Scientist at Verizon, and Stephen Boyer CTO and CoFounder at BitSight discuss botnet data featured in the 2015 Verizon DBIR.

  • "Twice as Likely": Brought to you by BitSight

    Do you know your company's botnet grade? Register for a free demo: http://info.bitsighttech.com/2x

  • BitSight Bits: Risk Mitigation Services in Cyber Insurance

    Watch the full webinar here: https://info.bitsighttech.com/risk-mitigation-serivces-cyber-insurance-underwriting Ira Scharf, GM of Cyber Insurance at BitSight joins Tracie Grella of AIG and Neeraj Sanhi of Willis to discuss the use of risk mitigation services in cyber insurance underwriting.

  • BitSight Bit: Data Breakdown

    Watch the full webinar here: https://info.bitsighttech.com/security-ratings-by-the-numbers-webinar Mike Woodward, Program Director of Data, talks about the number of data sources, data vendors, and data processed by BitSight on a daily basis.

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • The Rising Face of Cybercrime: Ransomware

    Ransomware has been all the talk lately in the security industry- and deservedly so. These attacks have surged in the last year: hospitals, banks, and local police departments have all been infected with ransomware. Organizations have been paralyzed for days and weeks as a result of ransomware infections. In March, a MedStar Health clinic in Baltimore reportedly turned away patients and had troubl...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • How Does BitSight Work? A Look At Security Ratings & How They’re Used

    What is BitSight? BitSight’s goal is to translate complex cybersecurity issues into simple business context through the use of security ratings. In doing this, BitSight helps companies: Understand their own security performance, and the performance of their vendors, clients, and other third parties.  Continuously assess cyber risks. Make better business decisions using objective, verifiab...

  • 3 Attack Vectors That Lead To Cybersecurity Breaches

    When we talk about cybersecurity events, we often discuss “the three principles of security”—which are often abbreviated “CIA”: 

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 3 months ago

Shall we increase our level of intimacy?

40,848,304 ideas and insights to help you find what’s next.

Log in Sign up

Shall we increase our level of intimacy?

40,848,304 ideas and insights to help you find what’s next

Create Free Account

Already a user?  Log in