BITSIGHT SECURITY RATINGS BLOG

Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.

Filter by Topic

Filter by Date

4 Things CISOs & Security Managers Are Thinking About Today

We were curious about what CISOs and security managers have on their minds these days—so we searched around online and asked a few to share their thoughts. Below, you’ll find some interesting insights and observations to get a good...

READ MORE »

How Secure Are America's Largest Business Partners?

Fortune 1000 organizations are acknowledged for generating significant amounts of revenue. Yet beyond bringing in a considerable amount of money, these companies are also integral to the supply chains of many organizations around the...

READ MORE »

4 Reasons Traditional Vendor Risk Management Strategies Fall Short

Vendor risk management (VRM) is the practice of evaluating business partners, associates, or third-party vendors both before a business relationship is established and during the duration of your business contract. This is a...

READ MORE »

What is Cybersecurity Risk and How Can You Manage It?

This post was updated on January 27, 2020.

In the world of risk management, risk is commonly defined as threat times vulnerability times consequence. The objective of risk management is to mitigate vulnerabilities to threats and the...

READ MORE »

New Report: Cybersecurity In The Legal Sector

Cyber criminals are constantly looking for new ways to gain access to sensitive information, trade secrets, or intellectual property from companies with strong security measures. But if those organizations have strong security measures in...

READ MORE »

The Top 7 CIO Challenges In 2017

In today’s security landscape, the CIO has a large and important role to fill. They must be aware of and compliant with regulations in their industry, focus on ensuring that the right security controls are in place for the organization and...

READ MORE »

Data Breach Statistics: 7 Of The Most Reputable Sources For Good Data

Understanding the consequences of cyberattacks and the importance of putting cybersecurity measures in place is more important today than ever before. Therefore, the need for data-driven breach statistics and facts from the cybersecurity...

READ MORE »

How To Approach IT & Cybersecurity Benchmarking As A CIO

To a chief information officer (CIO), cybersecurity is a multifaceted concern. Not only could a breach that results in a loss of sensitive data or information be a legal or reputational nightmare for their organization, but it could also...

READ MORE »

Analyzing The CIO's Roles & Responsibilities Regarding Cybersecurity

The chief information officer (CIO) has traditionally owned IT security — and in recent years, cybersecurity has become a larger part of the modern CIO’s responsibility. Cybersecurity is a company-wide issue — and it’s everyone’s...

READ MORE »
Load More

Get the Weekly Cybersecurity Newsletter.