Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.

Filter by Topic

Filter by Date

Third-Party Breaches Of 2015: What We Learned Over The Year

2015 has been fantastic for some companies—but for those who dealt with a third-party breach or cybersecurity issue, it was likely more difficult. If this happened to your firm in 2015, you’re not alone. Consider these four large incidents:


The Top 22 IT Security Blogs Of 2015

If you want to find out what’s happening in the world, you probably turn to your favorite news outlet. Maybe it’s your local paper or something more widely circulated, like the Washington Post or the New York Times. But if you want to find...


BitSight Insights: Peer-To-Peer Peril & File Sharing Risks

This is a two-part blog post. First, you'll discover the key findings in our latest BitSight Insights report titled “Peer-To-Peer Peril: How Peer-To-Peer File Sharing Impacts Vendor Risk and Security Benchmarking.” In the second part,...


What is IT Risk Management?

This post was updated on January 27, 2020.

IT risk management is defined as the policies, procedures, and technology an organization adopts in order to reduce the threats, vulnerabilities, and consequences that could arise if data is not...


Cybersecurity Metrics: Importance, Measurement, & Guidelines

This is a Q&A session with Ed Pollock, the Chief Information Security Officer at STERIS Corporation. Ed offers years of experience in the cybersecurity field and has offered some excellent advice about monitoring cybersecurity metrics.

Load More

Subscribe to get security news and updates in your inbox.