BitSight Security Ratings Blog

The latest security ratings happenings and advice to keep
your company’s security posture strong.


What is BitSight?

BitSight’s goal is to translate complex cybersecurity issues into simple business context through the use of security ratings. In doing this, BitSight helps companies:

  • Understand their own security performance, and the...
Read More

3 Attack Vectors That Lead To Cybersecurity Breaches

Melissa Stevens | September 8, 2016

When we talk about cybersecurity events, we often discuss “the three principles of security”—which are often abbreviated “CIA”: 

Read More

A Vendor Risk Management Checklist For Small Companies

Melissa Stevens | September 1, 2016

Vendor risk management (VRM) is a very broad category that encompasses all the measures an organization may take to prevent issues or business disruptions that arise due to vendor and third party relationships. Legal issues, past...

Read More

How Point of Sale Breaches Happen

Ryan Heitsmith | August 29, 2016

In recent weeks, the security news has been dominated by announcements of data breaches resulting from Point of Sale (PoS) malware present on payment processing terminals. All 350 North American Eddie Bauer retail locations and 20...

Read More

You’ve likely heard your fair share of mortifying headlines involving IT vendor management. Many of the highly publicized breaches in the last several years occurred simply because the companies did not follow basic best practices for IT...

Read More

Torrents: the good, the bad, and the ugly

Mike Woodward | August 23, 2016

A number of leading torrent websites have gone offline recently, drawing attention again to the use of torrents to share copyrighted material. But the absence of these sites doesn’t mean torrents have stopped. Torrenting is a peer-to-peer...

Read More

Organizations today aren’t single entities—they are interconnected networks of third parties. And while third party relations are critical for success in most businesses, they also leave data more vulnerable to exposure from bad actors....

Read More

There have been a number of large healthcare breaches in recent years. In fact, the Washington Post called 2015 the “year of the health-care attack.” This chart, accessed from Modern Healthcare, represents 11 of the largest healthcare...

Read More

Breaking Down 3 Of The Latest Cybersecurity Breaches

Melissa Stevens | August 11, 2016

Even with every safeguard in place, it’s simply impossible to avoid all cybersecurity breaches. That being said, there are things you can do to lower the chance of a catastrophic one happening in your organization. By looking at a few...

Read More


We’d love to show you how you can simplify your risk management and take charge of your cyber security with these intuitive and powerful solutions.

Request Demo