Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.

Filter by Topic

Filter by Date

Meet Our Engineers: Kevin Chen

Want to know what it’s like to be an engineer at a fast-growing start-up? Check out this Q&A with a member of BitSight’s engineering team to learn about his role as Engineering Manager, his experience, and more.


How the Impact of WannaCry Ransomware Was Felt Around the World

After the initial analysis of the WannaCry ransomware attacks, our Research & Development team put together a global assessment of the impacts and repair process needed for affected systems to recover. 


12 Key Takeaways From 6 Cybersecurity Insights Reports

At BitSight, our data scientists are constantly analyzing new cybersecurity trends and information and then extracting the data most pertinent to our customers. With those findings, we create what we call a BitSight Insights report....


Meet Our Data Scientists: Tom Montroy

Want to know what it’s like to be a member of BitSight’s data science team? Read this Q&A with BitSight’s Senior Data Scientist, Tom Montroy, to learn about his job, experience, and more.


Continuous Security Monitoring - 5 Key Components | BitSight

Utilizing a continuous security monitoring strategy for the purposes of cybersecurity can give your security team higher visibility into your threat landscape. To get the most value when investing in continuous security monitoring you...


Meet Our Engineers: Brian O'Halloran

Check out this Q&A with a member of BitSight’s engineering team to learn about his role as a Senior Test Engineer at BitSight, his experience, and more.


Understanding the Effects of DoublePulsar & WannaCry Across Industries

The Shadow Brokers, a hacking group known for releasing exploits and vulnerabilities allegedly used by the National Security Agency (NSA), published a cache of tools over a month ago on April 14th. This release had initially caused...


Vendor Risk Management: 5 Ways To Improve Your Efficiency

Consider this: If you’re part of a large company with thousands of suppliers, you need efficient processes and tools to get a good sense of the risk those suppliers present. If you’re a part of (or own) a small company with only 20...


5 Must-Haves When Transitioning to a Single Page Application

Spend any time in web development and you will be struck by the daunting pace at which the technology landscape changes.  The must-have technologies of today quickly become the legacy spaghetti code of yesterday.  In some cases,...


7 Of The Best Outlets For Data Breach News

Staying up-to-date on the latest data breach news is something most security professionals want to do more of. These seven outlets make finding information on data breaches and analysis therein much easier. We’ve listed them below—take...


Two Years Later, Still at Least Twice as Likely

In 2015, BitSight published a report, Beware the Botnets: Botnets Correlated to a Higher Likelihood of a Significant Breach. In that report, researchers discovered that companies with botnet grades of ‘B’ or lower were more than twice...

Load More

Get the Weekly Cybersecurity Newsletter.