BitSight Technologies
BitSight Technologies
Blog Post

New blog articles detected.

  • Are Data Breaches Actually on the Rise?
    Security media is pervaded by seemingly ever-increasing and ever-worsening reports of data breaches at businesses ranging from your mom-and-pop corner store to large retail and internet giants. But how accurate is the perception that breaches are on the rise? Are more security events actually happening, or are we simply observing increased compliance with strengthening reporting requirements? More...
BitSight Technologies
BitSight Technologies
Blog Post

New blog articles detected.

  • How Can Existing Vendor Risk Management Programs Efficiently Scale to Meet the Current Demand?
    In today’s world, organizations must be extremely conscientious about their vendors. It is just as important to be aware about the security of third-party networks as it is to be aware of their own. In April 2017, Netflix’s new season of the hit show “Orange is the New Black” was stolen and leaked after they ignored several ransom requests by a hacker. The agent was able to breach Larson Studios, ...
BitSight Technologies
BitSight Technologies
Blog Post

New blog articles detected.

  • Meet Our Engineers: Kevin Amorin
    Want to know what it’s like to be an engineer at BitSight? Check out this Q&A with a member of our engineering team to learn about his role as an engineering director, his experience, and more.
BitSight Technologies
BitSight Technologies
YouTube Video

New YouTube videos detected.

  • Creating Efficiencies in Vendor Risk Management
    As third-party vendor relationships become more complex and dynamic, organizations need to rethink the way they approach their vendor risk management strategies, says Stephen Boyer, CTO and co-founder of BitSight Technologies. In an interview with Tom Field of ISMG at RSA Conference 2017, Boyer discusses: - Shortcomings of traditional vendor risk management strategies - Ways that organizations c...
BitSight Technologies
BitSight Technologies
YouTube Video

New YouTube videos detected.

  • Measuring Security Performance - Easy As Pie
    BitSight Security Ratings makes measuring security performance easy as pie. Cut out waiting time and start improving your security posture nearly instantly — see how BitSight can help. Visit www.bitsighttech.com/easyaspie to learn more and request a demo.
BitSight Technologies
BitSight Technologies
YouTube Video

New YouTube videos detected.

  • Easy As Pie - BitSight Technologies at RSA Conference 2017
    Learn how BitSight Security Ratings makes measuring security performance as easy as pie. Stop by our booth #N5108 at RSA Conference 2017 to get your own free pie! All visitors will be entered to win a Deluxe Raspberry Pi Kit! Learn more at https://www.bitsighttech.com/rsa-2017-easy-as-pie.
BitSight Technologies
BitSight Technologies
YouTube Video

New YouTube videos detected.

  • Protecting Your Data - BitSight CTO Stephen Boyer Interview with CNBC
    In an interview with CNBC, BitSight Technologies co-founder and CTO, Stephen Boyer, says that most large-scale cybersecurity failures - like the one that resulted in Yahoo's recently announced data breach - happen because of carelessness of victim companies. Boyer discusses the cybersecurity ratings of different industries, and shares tips for consumers and businesses to protect their data and avo...
BitSight Technologies
BitSight Technologies
YouTube Video

New YouTube videos detected.

  • How TransUnion Informs & Scales Vendor Risk Management with BitSight Technologies
    Jasper Ossentjuk, Chief Information Security Officer at TransUnion, discusses the value BitSight brings to his organization. Ossentjuk explores how BitSight helped scale TransUnion's third-party security management program by doing more with less and taking a smarter approach to vendor risk management. Learn more at www.bitsighttech.com
BitSight Technologies
BitSight Technologies
YouTube Video

New YouTube videos detected.

BitSight Technologies
BitSight Technologies
YouTube Video

New YouTube videos detected.

  • Creating and Presenting Cybersecurity Metrics
    Download this full webinar here: https://info.bitsighttech.com/how-to-present-cybersecurity-to-the-board In this webinar, Jasper Osstentjuk and Richard Clarke discuss best practices for presenting cybersecurity to the board.
BitSight Technologies
BitSight Technologies
YouTube Video

New YouTube videos detected.

  • How The University of Arizona Uses BitSight
    Watch the full webinar: https://info.bitsighttech.com/mitigating-cyber-risk-with-security-ratings In this webinar Chris Schreiber, Information Security Officer for the University of Arizona how he uses BitSight Security Ratings as part of his cloud-first security strategy.
BitSight Technologies
BitSight Technologies
YouTube Video

New YouTube videos detected.

  • RSA Conference 2016 Survival Guide
    Going to the 2016 RSA Conference? We compiled a list of survival tips so you can prepare in advance. Come visit us at booth 5015 in Hall E to learn more about BitSight Security Ratings! Visit https://info.bitsighttech.com/survival-guide-for-rsa-2016 for more information.
BitSight Technologies
BitSight Technologies
YouTube Video

New YouTube videos detected.

  • Peer-To-Peer File Sharing & Botnet Infections
    Watch the full webinar: https://info.bitsighttech.com/peer-to-peer-peril-file-sharing-security-performance Mike Woodward, Program Director of Data at BitSight discusses the correlation between peer-to-peer file sharing and botnet infections.
BitSight Technologies
BitSight Technologies
YouTube Video

New YouTube videos detected.

  • SSL Vulnerabilities By Industry
    Full webinar available here: https://info.bitsighttech.com/from-signal-action-security-metrics-business-decisions In this webinar Stephen Boyer and Jay Jacobs of BitSight explain how aggregate security data can be used to make business decisions.
BitSight Technologies
BitSight Technologies
YouTube Video
BitSight Technologies
BitSight Technologies
Blog Post

New blog articles detected.

  • Team Fun In The Summer Sun: Community Engagement at BitSight
    Here @BitSight, we are committed to our mission to transform the understanding of cyber risk through the usage of Security Ratings. It’s pretty serious stuff and involves lots of inspiration and even more perspiration. BUT we are not just about work. It’s important to us to have balance — to be involved in the local community and also to have plenty of fun.
BitSight Technologies
BitSight Technologies
Blog Post

New blog articles detected.

  • Cybersecurity In The Boardroom: A Complete Guide For Security Professionals
    CISOs, CIOs, and other security professionals are taking on huge roles of some of the largest organizations in the world to provide details on better data protection and security. They win business, which translates into profitability for the firm. In fact, security professionals who report to the board are becoming competitive differentiators. 
BitSight Technologies
BitSight Technologies
Blog Post

New blog articles detected.

  • The “Swap” Model: Is Your Goal to Mitigate Risk...Or Just Move it Around?
    In today’s security ratings services market, a few companies have offerings described as “swaps” or “slots.” When considering third party monitoring, this gives organizations the option to “trade out” which vendors they are monitoring when they see fit. But, does this type of disjointed monitoring actually proactively mitigate risk (which is the goal of utilizing a security ratings service) or jus...
BitSight Technologies
BitSight Technologies
Blog Post

New blog articles detected.

  • Meet Our Engineers: Caroline Gallagher
    Want to know what it’s like to be an engineer at BitSight? Check out this Q&A with a member of our engineering team to learn about her role as a software engineer, her experience, and more.
BitSight Technologies
BitSight Technologies
Blog Post

New blog articles detected.

  • How To Balance Speed & Quality In Your Cyber Underwriting Practices
    As an underwriter who’s constantly trying to balance being both quick and careful, the worst thing you can do is treat every single applicant the same. Doing so can ultimately be setting you up to take on more risk than you’d expect. Of course, the more experience you have, the better you’re able to quickly assess a company’s risk posture.
BitSight Technologies
BitSight Technologies
Blog Post

New blog articles detected.

  • What Is Endpoint Security & Why Is It Important?
    From an IT perspective, an important part of endpoint security refers to ensuring that the endpoint devices connected to your network—computers, laptops, mobile devices, tablets, etc.—are running on the latest version or patch to all operating systems or software.
BitSight Technologies
BitSight Technologies
Blog Post

New blog articles detected.

  • Scaling Our SPA
    BitSight recently completed a reorganization of a large part of our Single Page Application (SPA) code. Our goal was to make our codebase more scalable and developer-friendly by adding a few simple rules for where different parts of the application should live. In this article, I’ll describe what we left the same, what we changed, and how we did this while continuing to ship features on time.
BitSight Technologies
BitSight Technologies
Blog Post

New blog articles detected.

  • Vendor Risk Management: What Increases Your Risk & How To Combat It
    Organizations today aren’t single entities—they are interconnected networks of third parties. While third party relations are critical for success in the majority of businesses, they also leave data more vulnerable to exposure. In today’s threat landscape, vendor risk management (VRM) is absolutely critical and should be carefully considered across all business relationships.
BitSight Technologies
BitSight Technologies
Blog Post

New blog articles detected.

  • How Practitioners Can Share Their Security Expertise With the Board
    There’s no doubt that organizations understand the value of implementing strong cybersecurity programs and encouraging their third parties to do the same. As data breaches continue worldwide, 63% of those breaches are caused through a third party vendor, according to Soha Systems’ Third Party Advisory Group. As such, Boards of Directors realize the need to have security and risk practitioners such...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.