BITSIGHT SECURITY RATINGS BLOG

Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.

Filter by Topic

Filter by Date

BitSight Study: Just How Secure is the Business Services Sector?

Management consultants, accountants, public safety offices, marketing firms, and many more business and professional services organizations are high-value targets for cybercriminals due to the range of confidential client information they...

READ MORE »

Cybersecurity Vs. Information Security: Is There A Difference?

This post was originally published March 15, 2016 and has been updated for accuracy and comprehensiveness

READ MORE »

IT Risk Assessment Template: 40 Questions To Ask Your Vendors

This post was originally published November 12, 2015 and has been updated for accuracy and comprehensiveness

READ MORE »

How Much Does a Data Breach Cost in 2019?

This post was originally published October 31, 2016 and has been updated for accuracy and comprehensiveness

READ MORE »

What is Vendor Risk Management (VRM)?

This post was originally published Nov 19, 2015. It has been updated for accuracy and comprehensiveness.

Vendor Risk Management Definition

Vendor risk management (VRM) is the practice of evaluating business partners, suppliers, or...

READ MORE »

The Board’s Role in Managing Disruptive Risk: Enter Security Ratings

Today, disruptive risks are an area of focus for corporate directors worldwide. On a global basis, we face disruptions in areas like geopolitical volatility, economic slowdown, emerging technologies, cybersecurity threats, and climate...

READ MORE »

Cyber Risk Considerations During the M&A Process

Data breaches are a constant in today’s headlines, but in recent years the risk has been front and center of some of the most significant M&A deals. In 2017, Verizon discounted its acquisition price by $350 million when Yahoo belatedly...

READ MORE »

Cyber Security KPI and Information Security KPI Examples

While many IT, security, and risk professionals have developed good metrics and visuals for communicating internally about cyber risk, such as the safety cross and pareto charts, reporting on cybersecurity to non-technical individuals...

READ MORE »

Cybersecurity in Europe is Improving: Thank You GDPR?

After years of debate over whether to impose new cybersecurity regulations on companies,  General Data Protection Regulation (GDPR) laws went into effect in Europe in May 2018. Already we’ve seen several data breach victims ordered to pay...

READ MORE »
Load More

Get the Weekly Cybersecurity Newsletter.