BitSight Security Ratings Blog

The latest security ratings happenings and advice to keep
your company’s security posture strong.


There have been a number of large healthcare breaches in recent years. In fact, the Washington Post called 2015 the “year of the health-care attack.” This chart, accessed from Modern Healthcare, represents 11 of the largest healthcare...

Read More

Breaking Down 3 Of The Latest Cybersecurity Breaches

Melissa Stevens | August 11, 2016

Even with every safeguard in place, it’s simply impossible to avoid all cybersecurity breaches. That being said, there are things you can do to lower the chance of a catastrophic one happening in your organization. By looking at a few...

Read More

What is an Information Security Management System?

An information security management system (ISMS) is a structured approach used to better manage your company’s most critical data and information. It can be achieved by adopting an ISMS...

Read More

If you’re looking for some thought leadership in the information security space, searching #cybersecurity on Twitter isn’t going to give you clear advice or direction.

Read More

Why cyber insurance?

While cybersecurity insurance is a relatively new line of service in the industry (it’s only been around for the last 10-15 years), it is currently the fastest-growing form of insurance. And it’s no wonder—today, a...

Read More

The FDIC Breaches: Uncovered

Ryan Heitsmith | July 25, 2016

The Federal Deposit Insurance Corporation was brought into existence in 1933 in the wake of catastrophic bank failures that occurred during the Great Depression. The FDIC’s most recognizable function is insuring deposits up to $250,000,...

Read More

Today, performing information security risk analysis is an accepted part of managing any business, and it’s something most CEOs and board members take very seriously. They don’t just want to “check a box” for information risk management...

Read More

In a nutshell, a cybersecurity manager serves as the expert on cybersecurity protection, detection, response, and recovery.

Read More

A Security Rating Versus A Security Score

Noah Simon | July 18, 2016

Assessing the cybersecurity posture of trusted vendors, suppliers, and other business parties is a very complex task. With so many different elements involved to secure a network, it’s rare that a company is simply just “good,” “average,”...

Read More


We’d love to show you how you can simplify your risk management and take charge of your cyber security with these intuitive and powerful solutions.

Request Demo