BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

  • Petya / NotPetya: What Security Diligence Tells Us
    There are many details of yesterday’s ransomware attack are still being worked out, and its impact is still being assessed. Yet, there are many security diligence steps organizations can take to reduce exposure to these types of attacks. Below are best practices security and risk teams should be aware of, and implications for organizations who fall behind.
BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

  • Meet Our Data Scientists: Ryan Heitsmith
    Want to know what it’s like to be a data analyst? Check out this Q&A with a member of BitSight’s data science team to learn about what he does at BitSight, his experience, and more.
BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

  • Summarizing Federal & State Data Breach Notification Laws
    If your organization handles or works with a certain type of data, you have a legal obligation to protect that data. Generally speaking, this could refer to personal information like names, identifiers (i.e. social security numbers), health data, or financial data. If any such data is compromised, it’s not only your fiduciary responsibility to disclose the breach to those harmed—it’s also your leg...
BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

  • Catching the Blind Spots of Vendor Risk Management
    In today’s day and age, organizations understand that data breaches are a growing problem, but many fail to realize that a third party breach can impact them as much as a breach on their own network. Here we’ll examine several misconceptions surrounding vendor risk management (VRM), and how you can proactively create a strategy to avoid common pitfalls.
BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

  • Takeaways from the 2017 Gartner Security & Risk Management Summit
    This year marked another great Gartner Security & Risk Management Summit with over 3,000 attendees, bringing together CEOs, CIOs, CISOs, IT Directors, Risk Managers, and other risk and security professionals to National Harbor, MD from June 12-15. An underlying theme emerged from the numerous sessions I attended and the various conversations I had: all roads lead back to business value. Whether it...
BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

  • 8 Free Cybersecurity Resources For Risk Managers & CISOs
    Anyone who works in cybersecurity or organizational risk on a regular basis knows how valuable it is to stay up to date on the latest research. If you’re curious about a specific topic—anything from vendor security assessments to ransomware—or you want to improve your vendor risk management program, take a look at the cybersecurity resources and tips below. We’ve rounded up BitSight’s most frequen...
BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

  • Keeping Your Reputation Safe: Why Monitoring the Attribution of IP Addresses Matters
    BitSight Security Ratings are based on security events and configurations present on a company’s digital infrastructure. As we discuss these ratings with companies, we’ve found that many of them have infrastructure registered to them that they are unaware of. With the recent WannaCry ransomware attacks (and with the increased frequency of cyber incidents overall), it is becoming critical that orga...
BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

  • 4 Reasons To Use Security Ratings Before Your Next Acquisition
    For years, cybersecurity was considered a “check-the-box” discussion during the merger and acquisition (M&A) process. It was almost always examined to ensure there weren’t any glaring issues or major red flags—but there wasn’t a whole lot of care or thought put into it.
BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

  • Meet Our Engineers: Nuno Boavida
    Read this Q&A with a member of BitSight’s engineering team to learn about his role as a front-end developer in our Lisbon office, his experience, and more.
BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

  • 5 Credible Cybersecurity Threats To The Financial Services Sector
    The financial services sector has traditionally been viewed as highly mature when it comes to cybersecurity initiatives. In fact, this BitSight Insights report found that the financial sector had the highest Security Rating of all examined industries. But even though companies in the financial sector has been discussing the necessity of monitoring cybersecurity for quite some time, the threat land...
BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

  • Latest BitSight Insights Explores A Growing Risk Frequently Ignored: Critical Updates
    Last month, thousands of computers across the world were infected by a strain of ransomware known as WannaCry. Estimates show that this massive attack impacted over 300,000 computers across banks, hospitals, telecommunications services, train stations, and numerous other critical services. Months before this attack, Microsoft had released a patch of all Server Message Block (SMB) vulnerabilities, ...
BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

  • CIO Vs. CISO: Who Does What?
    Every organization handles security differently, based on their needs and internal structure—but in some midsized and large companies, both the chief information officer (CIO) and the chief information security officer (CISO) are involved. 
BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

  • How BitSight Helps Scale the Current Assessment Approach to Vendor Risk Management
    While your current Vendor Risk Management (VRM) program may have areas of strength, there is most certainly room for improvement. Vendor Risk Management programs are a significant driver of both internal and external advisor time, extremely costly, and limited in scale. How can you harness more actionable insight to scale your program and truly and continuously understand the cybersecurity of your...
BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

  • Meet Our Engineers: Kevin Chen
    Want to know what it’s like to be an engineer at a fast-growing start-up? Check out this Q&A with a member of BitSight’s engineering team to learn about his role as Engineering Manager, his experience, and more.
BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

  • Assessing the Global Impact of WannaCry Ransomware
    Since our initial post during the breakout of WannaCry ransomware, our Research & Development team has learned more about the spread of this malware. While the outbreak of this ransomware surprised the entire security community, the amount of ransoms collected is estimated to only be just over $100,000 dollars. Given the global reach of this attack and the rate of spread, the figure likely could h...
BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

  • 12 Key Takeaways From 6 Cybersecurity Insights Reports
    At BitSight, our data scientists are constantly analyzing new cybersecurity trends and information and then extracting the data most pertinent to our customers. With those findings, we create what we call a BitSight Insights report. Below, we’ve highlighted six of these reports, along with two key takeaways for each. We hope these summaries, statistics, and insights are valuable for you. 
BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

  • Meet Our Data Scientists: Tom Montroy
    Want to know what it’s like to be a member of BitSight’s data science team? Read this Q&A with BitSight’s Senior Data Scientist, Tom Montroy, to learn about his job, experience, and more.
BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

  • Meet Our Engineers: Brian O'Halloran
    Check out this Q&A with a member of BitSight’s engineering team to learn about his role as a Senior Test Engineer at BitSight, his experience, and more.
BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

  • Vendor Risk Management: 5 Ways To Improve Your Efficiency
    Consider this: If you’re part of a large company with thousands of suppliers, you need efficient processes and tools to get a good sense of the risk those suppliers present. If you’re a part of (or own) a small company with only 20 suppliers, you likely don’t have a team of full-time employees dedicated to vendor risk assessment—which makes efficient processes critical for you as well. 
BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

  • 5 Must-Haves When Transitioning to a Single Page Application
    Spend any time in web development and you will be struck by the daunting pace at which the technology landscape changes.  The must-have technologies of today quickly become the legacy spaghetti code of yesterday.  In some cases, adopting new technology is as simple as adding a new library. Other times, large scale architectural changes need to be made.  For those looking to move from traditional s...
BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

  • 7 Of The Best Outlets For Data Breach News
    Staying up-to-date on the latest data breach news is something most security professionals want to do more of. These seven outlets make finding information on data breaches and analysis therein much easier. We’ve listed them below—take a look, and make sure you bookmark them for later reading!
BitSight Technologies
BitSight Technologies
Blog Article

New blog articles detected.

  • Two Years Later, Still at Least Twice as Likely
    In 2015, BitSight published a report, Beware the Botnets: Botnets Correlated to a Higher Likelihood of a Significant Breach. In that report, researchers discovered that companies with botnet grades of ‘B’ or lower were more than twice as likely to experience a significant data breach. Now two years since that study, researchers examined more than 70,000 organizations and found similar results, inc...
BitSight Technologies
BitSight Technologies
Youtube Video

New YouTube videos detected.

  • How BitSight Helps Cyber Insurers
    BitSight collects and analyzes vast amounts of security data to make the cyber insurance underwriting process smarter, easier, faster, and less risky. Watch this video to learn why the industry's most sophisticated insurers use BitSight. Learn more and request a demo: www.bitsighttech.com/cyber-underwriting

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.