BITSIGHT SECURITY RATINGS BLOG

Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.

Filter by Topic

Filter by Date

How to Calculate Cyber Risk and Your Organization’s Financial Exposure

You've worked hard all year to prioritize your organization's resources to tackle the riskiest vulnerabilities in your cybersecurity program. But when you bring your progress to the board of directors, excited to demonstrate your...

READ MORE »

Cybersecurity for a Remote Workforce: 3 Strategies for the Year Ahead

Work from home practices introduce significant cyber risk to any organization. Worryingly, BitSight research discovered that remote office networks are 7.5 times more likely to have at least five distinct malware families on them than a...

READ MORE »

As Holiday Shopping Season Nears, Retailers May Be At Risk Of Ransomware

Recent BitSight research shows that 75% of retail businesses may be at increased risk of ransomware attacks as indicated by poor TLS/SSL configuration management. With the holiday shopping season upon us, it's more important than ever...
READ MORE »

3 Reasons for Attack Surface Scanning

Taking back control of your network in light of hackers’ growing sophistication can be time-consuming. Even well-established organizations with money to spend on solid cybersecurity programs are still falling victim to some of the new...

READ MORE »

Moody's: Cyber Risk Quantification Is Credit Positive

We are excited to announce the availability of the Moody’s Investor Services 2022 Cyber Risk Outlook. The report, which leverages data provided by BitSight, outlines factors shaping the landscape for cyber risk in 2022. BitSight is...

READ MORE »

3 Tips for Cyber Risk Mitigation that Drive Operational Efficiencies

Investments in digital initiatives are essential to success. But, according to Accenture, 79% of organizations are adopting new and emerging technologies faster than they can address security issues. The finding isn’t surprising. While...

READ MORE »

How to Define Your Cyber Risk Appetite & Hold Vendors to the Threshold

As cyberattacks surge, you’re charged with protecting your organization’s expanding digital footprint. But what about the risk posed by vendors?

It’s estimated that 60% of organizations now work with more than 1,000 third parties. If...

READ MORE »

CIS Critical Security Controls: What Are They and How Can You Meet These Standards?

As cyber threats evolve and business models change, maintaining a mature cybersecurity program can be challenging. You need to be confident that your organization’s current security tools and techniques are effective. All it takes is a...

READ MORE »

Continuous Controls Monitoring: Automatically and Continuously Identify Gaps in Security Controls

Gaps in security controls can be hard to detect. Misconfigured software, open ports, and unpatched systems all expose your organization to cyber risk. They also negatively impact your BitSight Security Rating.

READ MORE »

BitSight Apache Risk Analysis Highlights Need To Address CISA “Known Vulnerabilities”

Today, the Cybersecurity and Infrastructure Security Agency (CISA) issued Binding Operational Directive (BOD) 22-01, Reducing the Significant Risk of Known Exploited Vulnerabilities, to drive urgent and prioritized remediation of...

READ MORE »
Load More

Get the Weekly Cybersecurity Newsletter.