BITSIGHT SECURITY RATINGS BLOG

Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.

Filter by Topic

Filter by Date

Summarizing Federal & State Data Breach Notification Laws

If your organization handles or works with a certain type of data, you have a legal obligation to protect that data. Generally speaking, this could refer to personal information like names, identifiers (i.e. social security numbers),...

READ MORE »

Continuous Security Monitoring - 5 Key Components | BitSight

Utilizing a continuous security monitoring strategy for the purposes of cybersecurity can give your security team higher visibility into your threat landscape. To get the most value when investing in continuous security monitoring you...

READ MORE »

A Breakdown Of Recent OCC-Issued Examination Procedures For Third-Party Risk Management

Financial regulators have long been concerned about the cyber risk associated with third-party- supplied products or services in financial institutions. For example, in 2013, federal financial regulators put out an issuance to financial...

READ MORE »

What Should Be In Your Security Benchmark Reports?

A security benchmark report is a document that helps an organization identify their cybersecurity capabilities and initiatives and compare those efforts to peers or competitors of the same sector or size. This snapshot is prepared either...

READ MORE »

4 Things You Should Include In Your Data Breach Response Plan

If you’re working on organizational cybersecurity, one of your top goals is likely putting a system in place that will help identify data breach incidents as quickly as possible, whether that data is inside your organization or with one of...

READ MORE »

Cybersecurity Compliance and Regulation Best Practices

Over the last 5-10 years, we’ve seen a major uptick in the number of regulations across all sectors regarding cybersecurity. The following is a brief look at how cybersecurity regulations have been implemented across seven sectors and...

READ MORE »

Security Breaches in Healthcare: Lessons Learned From 5 Recent Cases

There have been a number of large security breaches in healthcare over recent years. Indeed, 89% of healthcare organizations have experienced a data breach in the past three years, and more than 32 million people had their protected health...

READ MORE »

Do Investors Care About Cybersecurity?

Given the financial, reputational, and legal harm that can arise from cyber breaches, corporate shareholders and investors are increasingly concerned about the cybersecurity of the companies in their investment portfolio. How will...

READ MORE »

Why Your Business Needs a Vendor Management Policy

This post was updated on September 14, 2020.

A vendor management policy is a best practice for organizations seeking to tier their vendors based on risk. Such a policy identifies vendors which pose the greatest cybersecurity risk to your...

READ MORE »
Load More

Get the Weekly Cybersecurity Newsletter.