BITSIGHT SECURITY RATINGS BLOG

Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.

Filter by Topic

Filter by Date

Uncovering the Impact of the MongoDB Vulnerability

Over the past couple of weeks, a major issue has surfaced affecting numerous companies that use MongoDB to store their data. Those who install MongoDB on a server and use default settings are exposing their data to the internet and...

READ MORE »

Do Investors Care About Cybersecurity?

Given the financial, reputational, and legal harm that can arise from cyber breaches, corporate shareholders and investors are increasingly concerned about the cybersecurity of the companies in their investment portfolio. How will...

READ MORE »

The Top Cybersecurity Threats Of 2016: An Overview For Board Meetings

Boards today have a vested interest in the cybersecurity posture of their companies. Because of this, board members are increasingly interested in being briefed on top cybersecurity threats and understanding the countermeasures that should...

READ MORE »

How Quickly are you Detecting Network Intrusions?

Recent breaches making headlines all share a troubling characteristic. In each breach detailed below, the intrusions of company networks lasted months - or in other cases, even longer than a year. While no company is impervious to a...

READ MORE »

RSA 2015: Emerging Trends in Infosec

Last week San Francisco became the information security capital of the world for the 2015 RSA Conference. Around 30,000 attendees, mostly security professionals and vendors, descended on the Moscone Center for a week of discussion about...

READ MORE »

InfoSec Breakdown: Latest Research Shows a Shift in Priorities

Recent reports and surveys show that organizations concentrated greater efforts toward cyber security in 2014 than they have in years past. Furthermore, cyber security has become a greater priority for IT professionals facing a variety of...

READ MORE »

Continuous Monitoring: 3 Keys to Government Success

In recent years, the US government has become a leading advocate for continuous monitoring of security threats and vulnerabilities. But how effectively are departments and agencies in implementing these programs? And how do we measure...

READ MORE »

How to Create a Cybersecurity Standard of Care

There has been a lot of debate recently about the role of senior executives and boards in managing cyber risk. If you’re involved in advising either of these groups today on cybersecurity, I urge you to focus on one thing: tugboats. 

READ MORE »

Monitoring SSL Vulnerabilities in Your Network

Microsoft has announced that it is removing SSLv3 support in both Internet Explorer (according to VentureBeat) and Azure Storage (according to Redmond Mag) on Tuesday, February 10. The company is not the first to stop supporting the...

READ MORE »
Load More

Get the Weekly Cybersecurity Newsletter.