<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=26304&amp;fmt=gif">

BitSight In The News

We're proud to be featured in these leading business & technology journals, blogs, and broadcasts.

— Filter by source —

see all
In recent years, more and more cybersecurity incidents have taken place as a result of insecure third-party vendors, business associates and contractors. For example, the repercussions of the...
Jacob Olcott discusses legal risk, reputational risk, financial risk, and cyber risks that vendors pose to businesses.
Even though most industries are investing heavily in cybersecurity, many companies are still playing catch up, discovering breaches days, months, and even years after they occur.
Continuous monitoring on its own is great for the detection and remediation of security events that may lead to breaches. But when it comes to allowing us to measure and compare the effectiveness...
In late 2002, the U.S. Government enacted a new law that was designed to hold each federal agency accountable to develop, document, and implement an agency-wide information security program,...

In order for underwriters to overcome this obstacle, objective cyber risk metrics can be used to both assess the insured AND their critical vendors. Ratings can be a valuable tool in identifying...

Shaun McConnon discusses how complimenting audits with a continuous evaluation of security effectiveness allows organizations to augment their view into the security risks of the extended enterprise.