BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 day ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 days ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • New Research: W-2 Phishing Scams Increase During Tax Season

    Stress and worry are emotions that are often linked with the period between the beginning of a new year and mid-April, the federal tax filing deadline. Modern technology has brought with it techniques and applications that reduce this burden by making it easier for consumers to prepare a tax return. Unfortunately the age of e-filing has come with increased risk of tax fraud due to cybercrime. Acco...

BitSight Technologies

Category: Content
Type: Youtube Video

Generated 1 week ago

  • Creating Efficiencies in Vendor Risk Management

    As third-party vendor relationships become more complex and dynamic, organizations need to rethink the way they approach their vendor risk management strategies, says Stephen Boyer, CTO and co-founder of BitSight Technologies. In an interview with Tom Field of ISMG at RSA Conference 2017, Boyer discusses: - Shortcomings of traditional vendor risk management strategies - Ways that organizations c...

BitSight Technologies

Category: Content
Type: Youtube Video

Generated 1 week ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 week ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • Cloudbleed: Breakdown of Cloudflare's Memory Leak

    On Thursday, February 23rd, Cloudflare announced a serious bug in its caching infrastructure that caused uninitialized memory to be printed on a number of its customers’ websites. This information included sensitive data such as passwords, cookies, tokens, private messages, and while it believes the bug was limited to roughly a thousand websites, it caused sensitive data to be dumped from potentia...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • What Should Be In Your Security Benchmark Reports?

    A security benchmark report is a document that helps an organization identify their cybersecurity capabilities and initiatives and compare those efforts to peers or competitors of the same sector or size. This snapshot is prepared either internally by the organization or by a third party.

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • 4 Things You Should Include In Your Data Breach Response Plan

    If you’re working on organizational cybersecurity, one of your top goals is likely putting a system in place that will help identify data breach incidents as quickly as possible, whether that data is inside your organization or with one of your vendors. Of course, simply knowing about a data breach incident isn’t enough—you have to take action immediately, or you could risk major data implications...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 week ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 week ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • 4 Reasons Traditional Vendor Risk Management Strategies Fall Short

    Vendor risk management (VRM) is the practice of evaluating business partners, associates, or third-party vendors both before a business relationship is established and during the duration of your business contract. This is a difficult—albeit necessary—process all companies should go through when they enter into a third-party relationship.

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • How To Combat Security Risks In Cyber Insurance

    As an underwriter in the cyber insurance industry, you know that insurance is all about information. You’re responsible for making decisions about your applicants based on the details given to you—but you’re also aware of the potential for asymmetry in this information.

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • How Secure Are America's Largest Business Partners?

    Fortune 1000 organizations are acknowledged for generating significant amounts of revenue. Yet beyond bringing in a considerable amount of money, these companies are also integral to the supply chains of many organizations around the world. Recognizing this, BitSight researchers set out to understand the security strengths and weaknesses found in Fortune 1000 companies. Companies that share data a...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • A Breakdown Of Recent OCC-Issued Examination Procedures For Third-Party Risk Management

    Financial regulators have long been concerned about the cyber risk associated with third-party- supplied products or services in financial institutions. For example, in 2013, federal financial regulators put out an issuance to financial institutions regarding how to manage third-party cyber risk. Over the last few years since this 2013 bulletin was published, the attention on third-party risk has ...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • 5 Reasons To Uncover Third-Party Risk With Security Ratings

    Any seasoned vendor risk manager will tell you that determining whether a particular third party’s cybersecurity is up to your standards—and deciding how much risk to assume through your relations with your vendors—is not a simple task. Even so, there are technologies available that make  handling vendor risk easier—and one of those is BitSight Security Ratings.

BitSight Technologies

Category: Content
Type: Youtube Video

Generated 2 months ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • What Is A Security Rating?

    A BitSight Security Rating is a simple way to understand and assess the cybersecurity posture of an organization or an organization’s vendors. It helps answer a number of critical cybersecurity questions:

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Uncovering the Impact of the MongoDB Vulnerability

    Over the past couple of weeks, a major issue has surfaced affecting numerous companies that use MongoDB to store their data. Those who install MongoDB on a server and use default settings are exposing their data to the internet and allowing anybody to browse the databases, download information, and erase them entirely. Many companies are unaware of the vulnerability and that their information may ...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Using Security Ratings and the NIST Framework as a Map to Cybersecurity Maturity

    On February 12, 2013, President Barack Obama issued Executive Order 13636, “Improving Critical Infrastructure Cybersecurity,” which called for collaboration between government and the private sector to create a set of standards for organizations to identify, assess, and manage cybersecurity risk. This led to the NIST Cybersecurity Framework (CSF), a way for organizations to manage cybersecurity ri...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Cybersecurity Risk: A Thorough Definition

    Risk is commonly defined as threat times vulnerability times consequence. This formula applies to anything that could be exposing you to danger, but when applied to cybersecurity—the unique risks individuals and businesses face as a result of using interconnected technological systems—it provides us with a great deal of insight on risk mitigation.

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • What You Need To Know About Vendor Compliance

    Merriam-Webster defines compliance as “the act or process of doing what you have been asked or ordered to do.” This, of course, is important when it comes to cybersecurity. You need to know that your vendors are willing to comply with your security requests and meet your expectations. Below, we’ve outlined the seven things your organization needs to do to ensure vendor compliance (and go beyond co...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • New Report: Cybersecurity In The Legal Sector

    Cyber criminals are constantly looking for new ways to gain access to sensitive information, trade secrets, or intellectual property from companies with strong security measures. But if those organizations have strong security measures in place, it can be difficult to access—unless they go through a third party. One of the most direct connections to this information is the legal industry, which is...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

BitSight Technologies

Category: Content
Type: Youtube Video

Generated 3 months ago

  • Protecting Your Data - BitSight CTO Stephen Boyer Interview with CNBC

    In an interview with CNBC, BitSight Technologies co-founder and CTO, Stephen Boyer, says that most large-scale cybersecurity failures - like the one that resulted in Yahoo's recently announced data breach - happen because of carelessness of victim companies. Boyer discusses the cybersecurity ratings of different industries, and shares tips for consumers and businesses to protect their data and avo...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 3 months ago

New blog articles detected

  • A View into the Dark Web

    There is a parallel universe in the cyber world known as the “Dark Web.” It’s a part of the Internet inaccessible via standard browsers or search engines, and it’s where cyber criminals share botnet kits, trade bitcoins, and recruit other hackers to carry out attacks. Over the years, the “Dark Web” has also provided an anonymous marketplace for criminals to sell information stolen from data breach...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 3 months ago

New blog articles detected

  • Don’t Ignore Law Firms: Why Cybersecurity in the Legal Sector Matters

    Vendor security is becoming a focal point of risk management for many organizations. In many ways, this trend started with the Target breach from 2013, which highlighted the extensive financial and reputational impact of a third party security breach. Gartner estimates that by 2019, the need for transparency into operational and security activities within a vendor's value network will drive demand...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in