<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=26304&amp;fmt=gif">

BITSIGHT SECURITY RATINGS BLOG

Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.

Meet Our Engineers: Kevin Chen

Want to know what it’s like to be an engineer at a fast-growing start-up? Check out this Q&A with a member of BitSight’s engineering team to learn about his role as Engineering Manager, his experience, and more.

READ MORE »

Assessing the Global Impact of WannaCry Ransomware

Since our initial post during the breakout of WannaCry ransomware, our Research & Development team has learned more about the spread of this malware. While the outbreak of this ransomware surprised the entire security community, the amount...

READ MORE »

12 Key Takeaways From 6 Cybersecurity Insights Reports

At BitSight, our data scientists are constantly analyzing new cybersecurity trends and information and then extracting the data most pertinent to our customers. With those findings, we create what we call a BitSight Insights report. Below,...

READ MORE »

Meet Our Data Scientists: Tom Montroy

Want to know what it’s like to be a member of BitSight’s data science team? Read this Q&A with BitSight’s Senior Data Scientist, Tom Montroy, to learn about his job, experience, and more.

READ MORE »

5 Things To Consider While Building Your Continuous Security Monitoring Strategy

At the outset of building a continuous security monitoring strategy for the purposes of cybersecurity, you first need to understand how data can be compromised. The three main ways are:

READ MORE »

Meet Our Engineers: Brian O'Halloran

Check out this Q&A with a member of BitSight’s engineering team to learn about his role as a Senior Test Engineer at BitSight, his experience, and more.

READ MORE »

Understanding the Effect of DoublePulsar and WannaCry Across Industries is the Key to Protecting your Supply Chain

The Shadow Brokers, a hacking group known for releasing exploits and vulnerabilities allegedly used by the National Security Agency (NSA), published a cache of tools over a month ago on April 14th. This release had initially caused panic...

READ MORE »

Vendor Risk Management: 5 Ways To Improve Your Efficiency

Consider this: If you’re part of a large company with thousands of suppliers, you need efficient processes and tools to get a good sense of the risk those suppliers present. If you’re a part of (or own) a small company with only 20...

READ MORE »

5 Must-Haves When Transitioning to a Single Page Application

Spend any time in web development and you will be struck by the daunting pace at which the technology landscape changes.  The must-have technologies of today quickly become the legacy spaghetti code of yesterday.  In some cases, adopting...

READ MORE »

7 Of The Best Outlets For Data Breach News

Staying up-to-date on the latest data breach news is something most security professionals want to do more of. These seven outlets make finding information on data breaches and analysis therein much easier. We’ve listed them below—take a...

READ MORE »

Two Years Later, Still at Least Twice as Likely

In 2015, BitSight published a report, Beware the Botnets: Botnets Correlated to a Higher Likelihood of a Significant Breach. In that report, researchers discovered that companies with botnet grades of ‘B’ or lower were more than twice as...

READ MORE »
Load More

Subscribe to get security news and updates in your inbox.