BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 day ago

BitSight Technologies

Category: Positioning & Presence
Type: Page Design Update

Generated 3 days ago

BitSight Technologies

Category: Content
Type: Youtube Video

Generated 3 days ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 3 days ago

New blog articles detected

  • TransUnion Receives CSO50 Award with Enterprise Security Ratings Platform

    Information security leaders today are faced with increasingly complex challenges, needing to balance the demands of a growing business against the risks of operating in a global, connected marketplace. To be successful, they must bring a novel approach to problem solving and foster collaborative relationships across the organization. This is why each year, IDG “honors innovative security projects...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 4 days ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 5 days ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 week ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 weeks ago

New blog articles detected

  • Analyzing Cybersecurity & Reputational Risk Management In Financial Institutions

    Reputational risk is the potential for damage to an organization’s character or good name. If a bank or financial institution is hit with an incident that puts a mark on its reputation, the event could compromise the company’s perceived legitimacy, thus affecting the number of current customers, prospective customers, shareholders, and the stock price. And because information is disseminated onlin...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 2 weeks ago

New blog articles detected

  • Inherent Risk: How Insecure Systems Pose a Threat to Network Security

    A few months ago, Anubis BitSight Labs researchers discovered that millions of low-cost Android phones, many of them in the United States, were vulnerable to Man-in-the-Middle attacks. The backdoor could be exploited through unregistered internet domains that had been hardwired into the Ragentek firmware used in these devices. A hacker with control of the domains could have installed malware bypas...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 3 weeks ago

New blog articles detected

  • Sovereign Security Ratings: Assessing Cyber Risk At The National Level

    BitSight is thrilled to announce BitSight Sovereign Security Ratings, the first objective measurement of national cybersecurity performance. Sovereign Security Ratings measure the security hygiene of nations by observing their IP space and collecting externally observable data on the presence of machine compromise and malware, security diligence, and user behaviors. Government agencies and Compute...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 4 weeks ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 month ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 month ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • New Research: W-2 Phishing Scams Increase During Tax Season

    Stress and worry are emotions that are often linked with the period between the beginning of a new year and mid-April, the federal tax filing deadline. Modern technology has brought with it techniques and applications that reduce this burden by making it easier for consumers to prepare a tax return. Unfortunately the age of e-filing has come with increased risk of tax fraud due to cybercrime. Acco...

BitSight Technologies

Category: Content
Type: Youtube Video

Generated 1 month ago

  • Creating Efficiencies in Vendor Risk Management

    As third-party vendor relationships become more complex and dynamic, organizations need to rethink the way they approach their vendor risk management strategies, says Stephen Boyer, CTO and co-founder of BitSight Technologies. In an interview with Tom Field of ISMG at RSA Conference 2017, Boyer discusses: - Shortcomings of traditional vendor risk management strategies - Ways that organizations c...

BitSight Technologies

Category: Content
Type: Youtube Video

Generated 1 month ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 month ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • Cloudbleed: Breakdown of Cloudflare's Memory Leak

    On Thursday, February 23rd, Cloudflare announced a serious bug in its caching infrastructure that caused uninitialized memory to be printed on a number of its customers’ websites. This information included sensitive data such as passwords, cookies, tokens, private messages, and while it believes the bug was limited to roughly a thousand websites, it caused sensitive data to be dumped from potentia...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • What Should Be In Your Security Benchmark Reports?

    A security benchmark report is a document that helps an organization identify their cybersecurity capabilities and initiatives and compare those efforts to peers or competitors of the same sector or size. This snapshot is prepared either internally by the organization or by a third party.

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • 4 Things You Should Include In Your Data Breach Response Plan

    If you’re working on organizational cybersecurity, one of your top goals is likely putting a system in place that will help identify data breach incidents as quickly as possible, whether that data is inside your organization or with one of your vendors. Of course, simply knowing about a data breach incident isn’t enough—you have to take action immediately, or you could risk major data implications...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 month ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 month ago

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • 4 Reasons Traditional Vendor Risk Management Strategies Fall Short

    Vendor risk management (VRM) is the practice of evaluating business partners, associates, or third-party vendors both before a business relationship is established and during the duration of your business contract. This is a difficult—albeit necessary—process all companies should go through when they enter into a third-party relationship.

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • How To Combat Security Risks In Cyber Insurance

    As an underwriter in the cyber insurance industry, you know that insurance is all about information. You’re responsible for making decisions about your applicants based on the details given to you—but you’re also aware of the potential for asymmetry in this information.

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • How Secure Are America's Largest Business Partners?

    Fortune 1000 organizations are acknowledged for generating significant amounts of revenue. Yet beyond bringing in a considerable amount of money, these companies are also integral to the supply chains of many organizations around the world. Recognizing this, BitSight researchers set out to understand the security strengths and weaknesses found in Fortune 1000 companies. Companies that share data a...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • A Breakdown Of Recent OCC-Issued Examination Procedures For Third-Party Risk Management

    Financial regulators have long been concerned about the cyber risk associated with third-party- supplied products or services in financial institutions. For example, in 2013, federal financial regulators put out an issuance to financial institutions regarding how to manage third-party cyber risk. Over the last few years since this 2013 bulletin was published, the attention on third-party risk has ...

BitSight Technologies

Category: Content
Type: Blog Article

Generated 3 months ago

New blog articles detected

  • 5 Reasons To Uncover Third-Party Risk With Security Ratings

    Any seasoned vendor risk manager will tell you that determining whether a particular third party’s cybersecurity is up to your standards—and deciding how much risk to assume through your relations with your vendors—is not a simple task. Even so, there are technologies available that make  handling vendor risk easier—and one of those is BitSight Security Ratings.

BitSight Technologies

Category: Content
Type: Youtube Video

Generated 3 months ago

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in