<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=26304&amp;fmt=gif">

BITSIGHT SECURITY RATINGS BLOG

Read about the latest cybersecurity news and get advice on vendor risk management, reporting to the board, managing cyber risks, benchmarking security performance, and more.

The 5 Pillars Of Cybersecurity In Financial Services

Financial services is a wide industry, encompassing banks, insurance companies, investment firms, analysts, consultants, and many more. We’ve found financial services to be one of the best performing sectors in terms of cybersecurity....

READ MORE »

BitSight’s Event Store in Production

This is the final entry in a three-part series on BitSight’s new Event Store. In the first and second posts, we described some key components of the architecture. Because of the limited number of access patterns we had to support (bulk...

READ MORE »

How To Lower The Risk Of A Bank Data Breach

The financial services industry is a leader in many aspects of cybersecurity performance and has set the standard in areas like vendor risk management. Why? Because risk is built into their culture. Inherent in the financial services...

READ MORE »

Cybersecurity News: The 15 Best Places To Get Great Info

Reading thetop cybersecurity blogs is, of course, one of the best ways to stay up on the latest news in the security industry. But while these niche blogs do often address news stories, most often they’re doing so while also interjecting...

READ MORE »

17 Major Data Breaches From 2013 To 2015

It goes without saying that the following data breaches were incredibly damaging, both to the companies and to those affected. Each has resulted in some level of data loss, financial loss, and reputational harm. Below, we’re exploring what...

READ MORE »

Mapping the Internet: Why High-Quality Company Asset Maps are the Foundation of BitSight Ratings

BitSight has an inventory of over 80,000 customer curated companies that can be instantly added to any portfolio. All rated companies have the capability to vet and provide feedback on all information within their asset map. This enables...

READ MORE »

Cybersecurity Vs. Information Security: Is There A Difference?

“Is there a difference between cybersecurity and information security?”

READ MORE »

How 400 Organizations Are Using BitSight Security Ratings in their Day-to-Day Processes

BitSight has grown tremendously over the last few years, and we’ve learned a lot about the many ways our customers are using BitSight Security Ratings. With over 400 customers (including 42 Fortune 500 companies) and 2,000 users from...

READ MORE »

Analyzing Vendor Risk Tools: Vulnerability Scans, Penetration Tests & More

This is a two-part blog post. First, you'll discover 5 things to keep in mind when selecting a vendor management software. In the second part, you'll read on to uncover the pros and cons of the many vendor risk management tools that...

READ MORE »

63,000 Personal Records Compromised in UCF Breach

Students and faculty from the University of Central Florida have filed a class action lawsuit alleging that the university failed to notify affected individuals of data loss resulting from a cyber attack in a timely manner. On February...

READ MORE »

Why You Need A Vendor Management Policy

A vendor management policy is put in place so an organization can tier their vendors based on risk. A policy like this identifies which vendors put the organization most at risk and then expresses which controls the company will implement...

READ MORE »

DROWN: Breaking Down The Latest TLS / SSL Vulnerability

A new security vulnerability in an older version of TLS / SSL was announced this week and has been named “DROWN” by its authors (Decrypting RSA with Obsolete and Weakened eNcryption). It’s estimated to affect up to 11 million servers using...

READ MORE »

Top 3 Cybersecurity Metrics To Start Tracking

Creating a vendor risk management program is of utmost importance in today’s threat landscape. So if you don’t have a program in place already, you may be wondering where—and how—you should get started. One of the building blocks for any...

READ MORE »
Load More

Subscribe to get security news and updates in your inbox.