BITSIGHT SECURITY RATINGS BLOG

Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.

Filter by Topic

Filter by Date

ISO 27001: A Definition & 5 Critical Implementation Questions Answered

What is ISO 27001?

To understand 27001, you need to first understand ISO. ISO is the acronym for the International Organization for Standardization, which creates international standards in virtually every industry. In fact, the...

READ MORE »

3 Recent Data Breaches & What You Can Learn From Them

It is well understood that an organization can never be 100% safe from data breaches—but it is possible to lower your company’s likelihood of experiencing a breach by using a number of good cybersecurity practices. Below, we’ve outlined...

READ MORE »

3 Critical CISO Roles and Responsibilities

A chief information security officer (CISO) is a senior-level executive who wears many hats in the realm of cybersecurity — but is primarily responsible for translating complex business problems into effective information security...

READ MORE »

How CISOs Should Establish A Vendor Management Process

Vendor management spans a wide variety of topics: from contracts, to metrics, to relationships, and beyond. But one of the most critical aspects of vendor management—particularly for a CISO—is how to manage the risk your vendors bring to...

READ MORE »

What To Include In Your Cybersecurity Board Of Directors Presentation

Most Boards today know that cybersecurity is a critical issue that simply cannot be overlooked — which means many Boards today receive regular briefings on the topic. If you’re a new CIO or CISO (or your organization has just begun this...

READ MORE »

Cybersecurity Policy & The Role Of The Executive Team

One of the primary roles of senior executives—from the CISO to the general council and all the way up to the board of directors—is to ensure that an organization has policies set in place for cybersecurity.

READ MORE »

28 Data Breach Statistics That Will Inspire You (To Protect Yourself)

The importance—and urgency—of cybersecurity measures have become increasingly visible in recent years. Yearly industry reports from the likes of VerizonTrustwave, and PwC all express the importance of cybersecurity measures and the...

READ MORE »

Analyzing Important Supply Chain Risk Management Data

Surveys highlighting third-party security and supply chain risk management best practices are conducted regularly. Many of them draw a similar conclusion: that supply chain risk management is a critical issue IT professionals are aware of,...

READ MORE »

Third-Party Security: How To Successfully Monitor For Potential Breaches

Recently, BitSight commissioned Forrester Consulting to examine the practices of IT decision-makers as they relate to third party monitoring and managing third-party risk. From the survey, we learned that 59% of IT decision-makers...

READ MORE »
Load More

Get the Weekly Cybersecurity Newsletter.