Category: BitSight Security Ratings Blog

Department of Defense Cybersecurity Maturity Model

Read the original article: Department of Defense Cybersecurity Maturity Model Government agencies in the United States are yet again suffering from a widespread data hack, this time originating from Microsoft Exchange servers. This breach comes less than five months after…

BitSight Observations Into HAFNIUM Attacks, Part Two

Read the original article: BitSight Observations Into HAFNIUM Attacks, Part Two Microsoft Exchange is a critical business software used by organizations around the world for email. Sensitive data and communications are stored and transacted on the platform daily. In an…

Should Security Ratings Require Independent Verification?

Read the original article: Should Security Ratings Require Independent Verification? As a recent Forrester report highlighted, there are many cybersecurity ratings available. Security ratings have a valuable place in your cyber risk mitigation strategy   Become a supporter of IT…

BitSight Observations Into the HAFNIUM Attacks: Part One

Read the original article: BitSight Observations Into the HAFNIUM Attacks: Part One On March 2, Microsoft announced that it has detected multiple zero-day exploits being used to attack on-premises versions of Microsoft Exchange Server. According to Microsoft, in the attacks…

BitSight Observations Into HAFNIUM: Part One

Read the original article: BitSight Observations Into HAFNIUM: Part One On March 2, Microsoft announced that it has detected multiple zero-day exploits being used to attack on-premises versions of Microsoft Exchange Server. According to Microsoft, in the attacks observed, cybersecurity…

Shadow IT: Your Urgent Questions Answered

Read the original article: Shadow IT: Your Urgent Questions Answered Your IT department spends a great deal of time distributing security information and maintaining your organization’s internal security processes. Unfortunately, a persistent threat, deemed shadow IT, is still making its…

How to prevent data leaks

Read the original article: How to prevent data leaks It’s every security manager’s worst nightmare. A member of the IT department reaches to alert that malicious software has been detected on an internal network, and the hacker potentially has access…

How to prevent data leaks

Read the original article: How to prevent data leaks It’s every security manager’s worst nightmare. A member of the IT department reaches to alert that malicious software has been detected on an internal network, and the hacker potentially has access…

What is cybersecurity enterprise risk management

Read the original article: What is cybersecurity enterprise risk management Despite the best efforts from security and risk leaders, it can be extremely difficult to establish an efficient and effective enterprise risk management plan. As with anything that requires buy-in…

How to Measure Cybersecurity Risk Across Your Digital Ecosystem

Read the original article: How to Measure Cybersecurity Risk Across Your Digital Ecosystem Cyber risk is everywhere. As organizations become increasingly interconnected — across business units, geographies, subsidiaries, remote offices, and third-party networks — the digital ecosystem is expanding rapidly.…

How to Measure Cybersecurity Risk Across Your Digital Ecosystem

Read the original article: How to Measure Cybersecurity Risk Across Your Digital Ecosystem Cyber risk is everywhere. As organizations become increasingly interconnected — across business units, geographies, subsidiaries, remote offices, and third-party networks — the digital ecosystem is expanding rapidly.…

We Answer Your Questions About The SolarWinds Hack

Read the original article: We Answer Your Questions About The SolarWinds Hack The SolarWinds hack, discovered in late 2020 when FireEye announced it had been targeted through a third party vulnerability, has now become one of the most widespread and…

Ransomware: Most Destructive Cybersecurity Trend of 2020

Read the original article: Ransomware: Most Destructive Cybersecurity Trend of 2020 As if the COVID-19 pandemic wasn’t bad enough, the unpredictable events of 2020 created the perfect storm for a huge escalation in ransomware attacks.   Become a supporter of…

CISO’s Board Report Cyber Security Toolkit

Read the original article: CISO’s Board Report Cyber Security Toolkit When it comes to reporting to the board, there are plenty of tools at the CISO’s disposal. Looking at the right metrics and putting them in the right context can…

The Financial Impact of SolarWinds Breach

Read the original article: The Financial Impact of SolarWinds Breach The SolarWinds breach is already one of the most significant cybersecurity incidents ever. And as with any unprecedented cyber event, this will have long-term effects on the way businesses and…

Is Single Sign-On Secure? SSO Benefits for Remote Work

Read the original article: Is Single Sign-On Secure? SSO Benefits for Remote Work Remote work has always introduced unique and evolving cyber risks. In our “new normal” operating environment, where entire workforces have gone remote, IT security teams are facing…

4 Things to Know About FISMA

Read the original article: 4 Things to Know About FISMA Recently we wrote about the top cybersecurity frameworks to reduce cybersecurity risk, and the Federal Information Security Management Act (FISMA) certainly belongs in that list. But what is FISMA? Who…

4Things to Know About FISMA

Read the original article: 4Things to Know About FISMA Recently we wrote about the top cybersecurity frameworks to reduce cybersecurity risk, and the Federal Information Security Management Act (FISMA) certainly belongs in that list. But what is FISMA? Who does…

Common Vulnerabilities Associated With Remote Access

Read the original article: Common Vulnerabilities Associated With Remote Access Last year, enterprise IT security got turned on its head. As the world adjusted to working from home, IT teams worked overtime to enable remote access for millions of employees.…

7 Cybersecurity Frameworks To Reduce Cyber Risk

Read the original article: 7 Cybersecurity Frameworks To Reduce Cyber Risk While security ratings are a great way to demonstrate that you’re paying attention to the cyber health of the organization you also need to show that you’re adhering to…

5 Core Elements of a Risk-Based Cybersecurity Dashboard

Read the original article: 5 Core Elements of a Risk-Based Cybersecurity Dashboard Curated cyber risk reports are essential to ensuring that security performance management information gets communicated effectively to the right stakeholders across your organization. Of course, reporting falls on…

Best Practices For Managing Third Party Risk

Read the original article: Best Practices For Managing Third Party Risk Properly managing third party risk and preventing damaging outcomes that result from gaps in your vendor ecosystem can be difficult and costly. With the recent SolarWinds data breach wreaking…

What Does Risk-Based Cybersecurity Reporting Look Like?

Read the original article: What Does Risk-Based Cybersecurity Reporting Look Like? Effective communication between different members of your team can make all the difference when it comes to maintaining your desired security posture and preventing massive cyber incidents. Reports can…

SolarWinds Orion Breach — BitSight Analysis Part 1

Read the original article: SolarWinds Orion Breach — BitSight Analysis Part 1 The cyber attack targeting SolarWinds, a provider of network and system monitoring software, is shaping up to be one of the most significant attacks against a critical supply…

SolarWinds Orion Breach — BitSight Analysis Part 1

Read the original article: SolarWinds Orion Breach — BitSight Analysis Part 1 The cyber attack targeting SolarWinds, a provider of network and system monitoring software, is shaping up to be one of the most significant attacks against a critical supply…

What Does Risk-Based Cybersecurity Reporting Look Like?

Read the original article: What Does Risk-Based Cybersecurity Reporting Look Like? Effective communication between different members of your team can make all the difference when it comes to maintaining your desired security posture and preventing massive cyber incidents. Reports can…

3 Steps to Building an Effective Cyber Risk Strategy

Read the original article: 3 Steps to Building an Effective Cyber Risk Strategy In today’s “new normal” operating environment, you’re contending with a growing attack surface, limited resources, and an increasingly remote workforce — all at once. Given these conditions,…

Zerologon Vulnerability: Analysis on This Dangerous Vulnerability

Read the original article: Zerologon Vulnerability: Analysis on This Dangerous Vulnerability New vulnerabilities emerge daily… but not every vulnerability is being actively exploited by nation state actors. Zerologon (CVE-2020-1472) is one such vulnerability.  Zerologon was recently identified by the National…

Zerologon: BitSight Observations on a Dangerous Vulnerability

Read the original article: Zerologon: BitSight Observations on a Dangerous Vulnerability New vulnerabilities emerge daily… but not every vulnerability is being actively exploited by nation state actors. Zerologon (CVE-2020-1472) is one such vulnerability.  Zerologon was recently identified by the National…

Zerologon: BitSight Observations on a Dangerous Vulnerability

Read the original article: Zerologon: BitSight Observations on a Dangerous Vulnerability New vulnerabilities emerge daily… but not every vulnerability is being actively exploited by nation state actors. Zerologon (CVE-2020-1472) is one such vulnerability.  Zerologon was recently identified by the National…

Meet Our Customer Success Team: Ashley Ritrovato

Read the original article: Meet Our Customer Success Team: Ashley Ritrovato Check out this Q&A with a US-based member of BitSight’s Customer Success team to learn about her role as an BitSight Advisor & Customer Success Manager, her experience, and…

BitSight’s View into the NSA’s Top Vulnerabilities

Read the original article: BitSight’s View into the NSA’s Top Vulnerabilities In a highly unusual move, the National Security Agency released research on October 20, 2020, highlighting 25 common vulnerabilities that are being actively exploited by Chinese state-sponsored actors.  The…

Meet Our Customer Success Team: Alessandra Pilloni

Read the original article: Meet Our Customer Success Team: Alessandra Pilloni Check out this Q&A with a London-based member of BitSight’s Customer Success team to learn about her role as an Customer Success Manager, her experience, and more.   Become…

Worm Phishing Campaign Success On The Rise

Read the original article: Worm Phishing Campaign Success On The Rise The majority of us have been through phishing training for our jobs, where the simplified best-practices for all employees are laid out. These usually include reporting to IT when…

Meet Our Customer Success Team: Alessandra Pilloni

Read the original article: Meet Our Customer Success Team: Alessandra Pilloni Check out this Q&A with a London-based member of BitSight’s Customer Success team to learn about her role as an Customer Success Manager, her experience, and more.   Become…

Meet Our Customer Success Team: Hayley Combs

Read the original article: Meet Our Customer Success Team: Hayley Combs Check out this Q&A with a Lisbon-based member of BitSight’s Customer Success team to learn about her role as an EMEA Customer Success Manager, her experience, and more.  …

Meet Our Customer Success Team: Jyotsana Shukla

Read the original article: Meet Our Customer Success Team: Jyotsana Shukla Check out this Q&A with a Australia-based member of BitSight’s Customer Success team to learn about her role as an Senior Customer Success Manager, her experience, and more.  …

Meet Our Customer Success Team: Jyotsana Shukla

Read the original article: Meet Our Customer Success Team: Jyotsana Shukla Check out this Q&A with a Australia-based member of BitSight’s Customer Success team to learn about her role as an Senior Customer Success Manager, her experience, and more.  …

3 Ways To Avoid A Ransomware Attack

Read the original article: 3 Ways To Avoid A Ransomware Attack Over the weekend of September 26th, major healthcare provider Universal Health Systems experienced a ransomware attack resulting in widespread computer systems failures. Without access to their digital databases, doctors…

Meet Our Customer Success Team: Maggie Fitzgerald

Read the original article: Meet Our Customer Success Team: Maggie Fitzgerald Check out this Q&A with a US-based member of BitSight’s Customer Success team to learn about her role as a Customer Success Manager, her experience, and more.   Advertise…

Continuous Vendor Risk Monitoring To Reach Assessment Efficiency

Read the original article: Continuous Vendor Risk Monitoring To Reach Assessment Efficiency If you’re using a “one-size fits all” approach to managing your vendor lifecycle, you are missing opportunities to save money and operate more efficiently. Vendor management efficiencies don’t…

How to Make Data-Driven, Strategic Cybersecurity Decisions

Read the original article: How to Make Data-Driven, Strategic Cybersecurity Decisions Data can be the key to making more informed, strategic cybersecurity decisions — and ensuring you’re spending your security dollars effectively. In order to get the most out of…

Is Your Cyber Security Communication Strategy Effective?

Read the original article: Is Your Cyber Security Communication Strategy Effective? One of the more challenging aspects of third party risk management is effectively communicating risk. Often the risks posed by vendors are highly technical, and it can be tempting…

5 Ways to Transform Your Security Program

Read the original article: 5 Ways to Transform Your Security Program Between difficulty communicating with boards and executives, decreasing budgets, and difficulty measuring how exactly risk was being reduced, security leaders are under pressure to change the way they do…

Do You Have the Right Vendor Management Policies?

Read the original article: Do You Have the Right Vendor Management Policies? If you’re experiencing frustrating delays and procedural roadblocks during your vendor management process, you’re not alone. Security managers are seeing an increase in the number of third-parties integrating…

4 Ways Security Leaders Can Lead Business Transformation

Read the original article: 4 Ways Security Leaders Can Lead Business Transformation It’s easy to forget that cybersecurity teams were facing significant headwinds going into 2020. After years of ever expanding budgets, new tech and new tools, a string of…

Why You Need to Build a Strong Security Program

Read the original article: Why You Need to Build a Strong Security Program In today’s competitive marketplace, more and more companies are realizing that maintaining a good security posture is a crucial market differentiator — playing an essential role in…

August Employee Spotlight: Marlene Lopes

Read the original article: August Employee Spotlight: Marlene Lopes Name: Marlene Lopes Job Title: Inside Sales Representative What do you do at BitSight and when did you start? I started in May 2019, so it’s been almost a year. I started as a…

Lessons Learned From The Garmin Cyberattack

Read the original article: Lessons Learned From The Garmin Cyberattack In the cybersecurity industry we deal with news of breaches or potential threats nearly every day, but when you really think about it, it’s bizarrely rare how little these events…

Cloud Security Monitoring: Discover and Mitigate Risk

Read the original article: Cloud Security Monitoring: Discover and Mitigate Risk Did you know that the volume of attacks on cloud services more than doubled in 2019? According to the 2020 Trustwave Global Security Report, cloud environments are now the…

July Employee Spotlight: Jen Jaworski

Read the original article: July Employee Spotlight: Jen Jaworski Name: Jen Jaworski Job Title: Technical Research Quality Assurer and Player Development Coach What do you do at BitSight and when did you start?    Advertise on IT Security News. Read the original…

What is Digital Risk Protection?

Read the original article: What is Digital Risk Protection? Digital risk protection (DRP) solutions can be powerful operational tools for security analysts and threat researchers looking to identify and address existing cyber risk exposures quickly. While these solutions can provide…

How To Mature Your Vendor Risk Management Program

Read the original article: How To Mature Your Vendor Risk Management Program There are layers of uncertainty plaguing security professionals when it comes to the time, money, and energy they spend focusing on their third-party risk management systems. Without the…

BitSight Data Highlights Vaccine Developer Vulnerabilities

Read the original article: BitSight Data Highlights Vaccine Developer Vulnerabilities Introduction As the biomedical community rushes to develop vaccines to combat COVID-19, malicious actors are seeking to steal the sensitive intellectual property that underpins treatment.   Advertise on IT Security…

5 Risks Of Outdated Software & Operating Systems

Read the original article: 5 Risks Of Outdated Software & Operating Systems If more than half of an organization’s endpoints are outdated, its chances of experiencing a detrimental breach of potentially sensitive data points nearly triples. With hackers looking for…

Expand Your Threat Intelligence Insights

Read the original article: Expand Your Threat Intelligence Insights As your attack surface grows and the threat environment becomes increasingly complex, it’s more important than ever to take a risk-based approach to cybersecurity. By doing so, you can focus your…

Do You Know Where Your Cybersecurity Gaps Are?

Read the original article: Do You Know Where Your Cybersecurity Gaps Are? In our ever-evolving, dynamic cybersecurity landscape, new vulnerabilities are being exploited daily and potential threats can escalate very quickly. Expectations and standards of care are constantly in flux…

Study: More Security Tools Hinder Response Efforts

Read the original article: Study: More Security Tools Hinder Response Efforts The global cybersecurity market is currently worth $173 billion and expected to grow to $270 billion by 2026. Yet as organizations invest more in security technology, a new global…

Protecting Sensitive Data: 4 Things To Keep In Mind

Read the original article: Protecting Sensitive Data: 4 Things To Keep In Mind The content in this piece was originally published by BitSight in April of 2017. This updated version includes current information about BitSight, our security rating and third-party…

5 Examples Of Sensitive Data Hackers Look For

Read the original article: 5 Examples Of Sensitive Data Hackers Look For This piece was originally published by BitSight in April of 2017. This updated version includes current information about BitSight, our security rating and third-party monitoring software, and the…