<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=26304&amp;fmt=gif">

BitSight In The News

We're proud to be featured in these leading business & technology journals, blogs, and broadcasts.

— Filter by source —

see all
“Just because something is a low probability doesn’t mean it’s going to be low impact,” said Stephen Boyer, co-founder of security firm BitSight.
As the media portrays the situation, our private health information is leaking to the outside world at an alarming rate. Based on BitSight's recently-released Third Annual Industry Benchmark...
“The Target breach, in particular, was a wake-up call for the sector ... and we’ve seen a lot of response since then,” said Stephen Boyer, founder and chief technology officer at BitSight.
Jacob Olcott discusses legal risk, reputational risk, financial risk, and cyber risks that vendors pose to businesses.
Cat-and-mouse dynamics have also created a business opportunity for the likes of Stark and Websense, both of which have penned papers outlining steps boards should take to get their houses in...

Jake Olcott writes about third party cyber risk, and what the Utilities industry needs to know in order to develop a robust vendor risk management program.

Despite advances over the past five years, IT vendor risk management is still done haphazardly and relies on static paper-based audits.

“If you see a particular botnet on a network on one day and then it’s gone the next day that means the company was infected but they dealt with it effectively,” said Ira Scharf, general manager...

When you think about online security, its a fair bet that the protection of your health records will be near the top of the list of the personal data that you value the most. Well, surprise:...
A number of technology providers are aiming to find better ways to help businesses and insurers gauge risk. Security-metrics firm BitSight, for example, uses external evidence of compromise—such...

Advisen also conducted research with BitSight Technologies to examine the types of attacks taking place. The study they undertook examined 2,671 digital data breaches over a two-year period. The...