BitSight Technologies
BitSight Technologies
Blog Post
  • This August, BitSight announced the release of several new risk vectors specifically chosen to help organizations identify and manage risks across their own networks and the networks of their third parties. BitSight chose those new risk vectors to enhance the insights across the “spectrum of risk” and provide a more comprehensive picture of an organization’s security posture.

BitSight Technologies
BitSight Technologies
Blog Post
  • October is Cybersecurity Awareness Month, which offers organizations the opportunity to thoroughly examine their security and risk programs and identify where any vulnerabilities might exist. Here at BitSight, we talk about risk management every day. However, we have to practice what we preach — our IT Team offered some insight into areas where organizations can improve their network health not ju...

BitSight Technologies
BitSight Technologies
Blog Post
  • Most insurers find that the cyber insurance renewal process is fairly efficient from a time perspective—but it’s not very effective. In other words, they are able to quickly re-underwrite a company in their portfolio, but don’t have any better understanding about the insured’s security posture to see whether the risk has changed and is still suitable to keep on the books.

BitSight Technologies
BitSight Technologies
Blog Post
  • An increasing number of security and risk management executives are being asked to present to the Board of Directors on the state of their — and their third parties’ — security and risk programs. A recent joint survey by Veracode and NYSE found that nearly 80% of directors said that cybersecurity topics are discussed at nearly every board meeting.

BitSight Technologies
BitSight Technologies
Blog Post
  • Between the massive WannaCry and NotPetya attacks of 2017, which reached businesses across the globe, ransomware is on the minds of many security professionals. Interest continues to increase as ransomware evolves into one of the most common forms of malware in existence.

BitSight Technologies
BitSight Technologies
Blog Post
  • Reducing cyber risk that stems from third and fourth party vendors is no easy task. It requires that organizations not only have the ability to continuously monitor and identify new risk, but also the ability to work with their vendors to fix security issues quickly. Getting to risk reduction quickly means that both organizations are communicating effectively, using data and evidence rather than c...

BitSight Technologies
BitSight Technologies
Blog Post
  • When it comes to vendor risk management, organizations ultimately need their vendors to meet the same standard of security performance they hold for their own organization. For years, the Finance industry has been a trailblazer in managing the risk posed by vendors, suppliers, and business partners. However, are vendors in the Finance supply chain meeting the same level of security performance hel...

BitSight Technologies
BitSight Technologies
Blog Post
  • The goal of cybersecurity is to help mitigate or prevent a cyber attack that could cause significant harm to your business, your operations, your financial performance, or your customers. But organizations with mature cybersecurity programs are increasingly aware of the fact that they cannot address every cyber threat since bad actors will continually find ways to hack and mine data. Instead, they...

BitSight Technologies
BitSight Technologies
Blog Post
  • In many lines of insurance, claim activity is part of the norm—and it’s expected that you’ll have to underwrite to losses consistently. For example, in casualty lines, it’s common to have workers file for worker’s compensation because of an injury they experienced on a job.

BitSight Technologies
BitSight Technologies
Blog Post
  • Today, businesses are at an interesting intersection when it comes to cybersecurity reporting: with modern technology, tons of data and thousands upon thousands of metrics are available to report on—but it’s difficult to determine which metrics actually matter. Because of this conundrum, many security and risk professionals feel a level of confusion around their security posture (and the security ...

BitSight Technologies
BitSight Technologies
Blog Post
  • The financial services industry is known for its mature cybersecurity programs. There are many drivers for this, one being the increasingly strict regulatory environment. For example, the Office of the Comptroller of the Currency (OCC) indicated in early 2017 that financial service companies should be prepared for examiners to evaluate third-party cybersecurity. 

BitSight Technologies
BitSight Technologies
Blog Post
  • The legal sector is one of the more interesting industries to examine when it comes to cybersecurity—and there are a few reasons for this. First, law firms and other legal organizations are one of the most widely-used third parties. While not every company uses payment processing machines or medical devices, nearly every company—large and small—works with a law firm in at least some capacity. Addi...

BitSight Technologies
BitSight Technologies
Blog Post
  • In today’s business environment, companies are often focused on how to best use technology to acquire new customers and improve the customer experience, as these IT applications help generate revenue for the organizations. But every CISO knows the more IT infrastructure connected to a system, the larger the organization’s attack surface is—which translates to more cyber risk. 

BitSight Technologies
BitSight Technologies
Blog Post
  • In today’s market, an increasing number of security and risk management executives are being asked to present to the Board of Directors on the state of their — and their third parties’ — security and risk programs. Gartner estimates that by 2020, 75% of Fortune Global 500 companies will treat vendor risk management as a board-level initiative to mitigate brand and reputation risk. BitSight underst...

BitSight Technologies
BitSight Technologies
Blog Post
  • In today’s market, an increasing number of security and risk management executives are being asked to present to the Board of Directors on the state of their — and their third parties’ — security and risk programs. Gartner estimates that by 2020, 75% of Fortune Global 500 companies will treat vendor risk management as a board-level initiative to mitigate brand and reputation risk. BitSight underst...

BitSight Technologies
BitSight Technologies
Blog Post
  • Special thanks to Venky Ganesan, the managing director of Menlo Ventures, for his insights into this topic. Cybersecurity training for boards of directors has become more common in recent years. But just because cybersecurity in general is being more widely discussed, that doesn’t mean the right information is always being passed along. 

BitSight Technologies
BitSight Technologies
Blog Post
  • A key factor in the widespread reach of the WannaCry ransomware attack earlier this year was that, prior to the attack, companies across hundreds of countries failed to apply a critical update (MS17-010) from Microsoft. This attack, along with the more recent NotPetya attack, has highlighted the prevalence and the risk of outdated software on corporate networks. In a recent report, A Growing Risk...

BitSight Technologies
BitSight Technologies
Blog Post
  • In the security ratings market, some offerings claim that a staggering percentage of the data they leverage is proprietary, and downplay the value of externally sourced data. While these companies may state that (close to) 100% of their data collection on IP maps, DNS records, event data and more is proprietary, there are several reasons why this is problematic. Let’s break down the myths surround...

BitSight Technologies
BitSight Technologies
Blog Post
  • Want to know what it’s like to be an engineer at BitSight? Check out this Q&A with a member of our engineering team to learn about his role as Team Lead, his experience, and more.

BitSight Technologies
BitSight Technologies
Blog Post
  • Within the BitSight Security Ratings platform, we analyze risk vectors specifically chosen to help organizations identify and manage risks across their own networks and the networks of their third parties. Over the past few months, BitSight has added new risk vectors to enhance the insights across the “spectrum of risk” and provide a more comprehensive picture of an organization’s security posture...

BitSight Technologies
BitSight Technologies
Blog Post
  • Security media is pervaded by seemingly ever-increasing and ever-worsening reports of data breaches at businesses ranging from your mom-and-pop corner store to large retail and internet giants. But how accurate is the perception that breaches are on the rise? Are more security events actually happening, or are we simply observing increased compliance with strengthening reporting requirements? More...

BitSight Technologies
BitSight Technologies
Blog Post
  • In today’s world, organizations must be extremely conscientious about their vendors. It is just as important to be aware about the security of third-party networks as it is to be aware of their own. In April 2017, Netflix’s new season of the hit show “Orange is the New Black” was stolen and leaked after they ignored several ransom requests by a hacker. The agent was able to breach Larson Studios, ...

BitSight Technologies
BitSight Technologies
Blog Post
  • Want to know what it’s like to be an engineer at BitSight? Check out this Q&A with a member of our engineering team to learn about his role as an engineering director, his experience, and more.

BitSight Technologies
BitSight Technologies
YouTube Video
  • As third-party vendor relationships become more complex and dynamic, organizations need to rethink the way they approach their vendor risk management strategies, says Stephen Boyer, CTO and co-founder of BitSight Technologies. In an interview with Tom Field of ISMG at RSA Conference 2017, Boyer discusses: - Shortcomings of traditional vendor risk management strategies - Ways that organizations c...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.