Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.

Filter by Topic

Filter by Date

Cyber Risk Should Be A Growing Concern to the Municipal Bond Market

Following an increase in ransomware cyber attacks, most notably May 2017’s WannaCry attack, U.S. public sector entities are starting to see the effects of these attacks on the almost $4 trillion municipal debt market. As a result,...


Petya / NotPetya: What Security Diligence Tells Us

There are many details of yesterday’s ransomware attack are still being worked out, and its impact is still being assessed. Yet, there are many security diligence steps organizations can take to reduce exposure to these types of...


Meet Our Data Scientists: Ryan Heitsmith

Want to know what it’s like to be a data analyst? Check out this Q&A with a member of BitSight’s data science team to learn about what he does at BitSight, his experience, and more.


Summarizing Federal & State Data Breach Notification Laws

If your organization handles or works with a certain type of data, you have a legal obligation to protect that data. Generally speaking, this could refer to personal information like names, identifiers (i.e. social security numbers),...


Catching the Blind Spots of Vendor Risk Management

In today’s day and age, organizations understand that data breaches are a growing problem, but many fail to realize that a third party breach can impact them as much as a breach on their own network. Here we’ll examine several...


Takeaways from the 2017 Gartner Security & Risk Management Summit

This year marked another great Gartner Security & Risk Management Summit with over 3,000 attendees, bringing together CEOs, CIOs, CISOs, IT Directors, Risk Managers, and other risk and security professionals to National Harbor, MD from...


8 Free Cybersecurity Resources For Risk Managers & CISOs

Anyone who works in cybersecurity or organizational risk on a regular basis knows how valuable it is to stay up to date on the latest research. If you’re curious about a specific topic—anything from vendor security assessments to...


Keeping Your Reputation Safe: Why Monitoring the Attribution of IP Addresses Matters

BitSight Security Ratings are based on security events and configurations present on a company’s digital infrastructure. As we discuss these ratings with companies, we’ve found that many of them have infrastructure registered to them...


4 Reasons To Use Security Ratings Before Your Next Acquisition

For years, cybersecurity was considered a “check-the-box” discussion during the merger and acquisition (M&A) process. It was almost always examined to ensure there weren’t any glaring issues or major red flags—but there wasn’t a whole...


Meet Our Engineers: Nuno Boavida

Read this Q&A with a member of BitSight’s engineering team to learn about his role as a front-end developer in our Lisbon office, his experience, and more.


5 Credible Cybersecurity Threats To The Financial Services Sector

The financial services sector has traditionally been viewed as highly mature when it comes to cybersecurity initiatives. In fact, this BitSight Insights report found that the financial sector had the highest Security Rating of all...


BitSight Research Explores A Risk Frequently Ignored: Critical Updates

Last month, thousands of computers across the world were infected by a strain of ransomware known as WannaCry. Estimates show that this massive attack impacted over 300,000 computers across banks, hospitals, telecommunications services,...


Meet Our Data Scientists: Jessica Louie

Check out this Q&A with one of BitSight’s data scientists to learn about what she does as a part of our data science team, her experience, and more.


CIO Vs. CISO: Who Does What?

Every organization handles security differently, based on their needs and internal structure — but in some mid-sized and large companies, both the chief information officer (CIO) and the chief information security officer (CISO) are...


BitSight Helps Scale the Current Vendor Risk Assessment Approach

While your current Vendor Risk Management (VRM) or Third-Party Risk Management (TPRM) program may have areas of strength, there is most certainly room for improvement. These programs are a significant driver of both internal and...

Load More

Get the Weekly Cybersecurity Newsletter.