BITSIGHT SECURITY RATINGS BLOG

Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.

Filter by Topic

Filter by Date

What Is Concentration Risk Management & Why Should It Matter To Insurers?

As insurers underwrite their book of business, they must have a good grasp on what potential losses could look like for each of their applicants. To better understand this, they evaluate hundreds of metrics—including those related to...

READ MORE »

Cybersecurity In The IoT (Internet Of Things): What You Need To Know

The “Internet of Things” (or “IoT”) is a blanket term that encompasses embedded devices that are connected online. There’s a slew of devices that fit within this category, ranging from consumer applications (like “smart” refrigerators and...

READ MORE »

Cybersecurity Audit Vs. Assessment: Which Does Your Program Need?

Whether you’re a security leader asked by the board to facilitate a cybersecurity audit, or a member of the board planning to request one, it’s crucial to know what is a cybersecurity audit, and what it isn’t. You need to know precisely...

READ MORE »

Technology Resiliency & Outsourcing (TRO): Familiarize Yourself

In a recent Huffington Post article, Shared Assessments senior director Tom Garrubba discussed how third-party risk management has become an important topic to many executives and board members around the world. He recalls a conversation...

READ MORE »

Takeaways From Yahoo's 500-Million-Account Breach

Last month, email giant Yahoo announced the compromise of 500 million user accounts—which is being called the largest breach from a single site in history. The breach compromised names, email addresses, telephone numbers, dates of birth,...

READ MORE »

How To Build Your Vendor Compliance Manual For Cybersecurity

Today, organizations don’t just ask their vendors, business partners, and third parties to perform a service or provide a product. They also expect them to meet a number of contractual requirements. Financial and legal requirements are...

READ MORE »

The Cybersecurity Pocket Dictionary: 24 Terms You Should Know

Like many technical industries, cybersecurity has a lot of specialized lingo. But there are two dozen cybersecurity terms in particular that are critical to understand. We’ve defined them here (in alphabetical order) and linked to a few...

READ MORE »

How Does BitSight Work? A Look At Security Ratings & How They're Used

Since our foundation in 2011 as the first company to provide a rating for measuring a company’s cyber security, BitSight has become the world-leading security ratings provider. BitSight is used around the world by industry leaders, country...

READ MORE »

3 Attack Vectors That Lead to Cybersecurity Breaches

When we talk about cybersecurity events, we often discuss “the three principles of security” — which can be abbreviated as “CIA”: 

READ MORE »
Load More

Get the Weekly Cybersecurity Newsletter.