Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.

Filter by Topic

Filter by Date

Three Steps to Reduce Your Security Risk

It may sound trite, but it's true; for organizations today, being breached is no longer a question of if, but when. In our recent analysis of security performance in the S&P 500, BitSight saw over 80% of the nation's largest...


Will Healthcare Be the Next Retail?

Today BitSight released a new BitSight Insights Report. Our objective in publishing these reports is to share findings from analysis conducted on the terabytes of security-incident data we gather on a daily basis. Due to our unique...


Investors DO Care About Data Breaches

I just read a good article with a controversial title by Eric Chemi in Business Week, "Investors Couldn't Care Less About Data Breaches." Chemi asserts that based on the current stock behavior of eBay and the prior stock activity of...


Vote for BitSight in the Advisen Cyber Risk Awards!

BitSight is very excited to announce that we've been nominated for an Advisen Cyber Risk Award for Cyber Risk Innovation of the Year.


FS-ISAC Recap: The Evolving Role of the CISO

Security professionals in the financial industry shared lessons learned from the past year and discussed challenges facing them in the coming year at the recent 2014 FS-ISAC and BITS Annual Summit. Topics ranged from malicious insiders...

Measuring Security Performance: Is Target More or Less Secure?

As a result of their major data breach late last year, Target has undergone a major house-cleaning to signify to the market just how seriously they are taking cyber security.


The Inevitability of Security Risk in the Board Room – Steinhafel is dead, long live Steinhafel

Originating from the French proclamations of Charles VII’s ascension to the throne after the death of Charles VI, “The King is dead, long live the King” speaks to the inevitability of succession. It is now not a stretch to think about...


New Methods for Assessing and Mitigating Security Risk

Businesses often undertake a check-box approach to cyber security by purchasing security products, meeting compliance standards and performing quarterly or yearly audits. While these methods have proven value, they are often not enough....


Discussing Third-Party Risk Management in the Healthcare Industry

Healthcare security and how updated HIPAA/HITECH Act regulations are changing the nature of risk in that industry are hot topics right now. "The rules have made it easier for organizations to have penalties levied against them because...

Load More

Get the Weekly Cybersecurity Newsletter.