Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:19 PM
Dark Reading
Dark Reading
Products and Releases

Technology Sector Lags In Security Effectiveness, Analysis Shows

Report analyzed security ratings for more than 70 Fortune 200 companies in energy, finance, retail, and technology

CAMBRIDGE, MA – Nov. 20, 2013 – BitSight Technologies, the only company to measure security effectiveness using objective and evidence-based ratings, today released the first BitSight Insight report, which analyzed security ratings for over 70 Fortune 200 companies in four industries – energy, finance, retail and technology. The objective was to uncover quantifiable differences in security effectiveness and performance across industries from October 2012 through September 2013. The study revealed that, in spite of all the attacks from criminals and hactivists over the past year, the financial industry has performed well. In contrast, the technology industry falls far behind, pointing to a need for greater focus on cyber risk management in this sector.

Leveraging big data for observed security incidents, including communication with known command and control servers, spam propagation and malware distribution, BitSight SecurityRatings provide a unique perspective on risk from the outside-in. BitSight SecurityRatings range from 250 to 900, with higher numbers equating to better security effectiveness. Factors used to determine ratings include the classification, frequency, and duration of observed security incidents.

"BitSight's outside in, data driven approach to rating shows clear differences amongst industries," said Stephen Boyer, BitSight co-founder and CTO. "By looking at evidence of compromise, we focus on outcomes rather than policies. Companies can have very similar policies, but their effectiveness can still vary widely. For example, the technology sector companies included in this analysis had significantly lower ratings than companies in the financial services sector. The spread is surprising."

Key Findings

· Technology Lags

Technology companies are required to be compliant with the regulations of the industries they serve, including HIPAA, PCI DSS and FISMA. With this consideration, it is surprising that the technology sector measures dramatically lower than retail and finance. High profile breaches including Bit9 and Adobe may indicate why the technology industry rates less effective. The Adobe data breach that also impacted Dun & Bradstreet and LexisNexis went unobserved for months before a third party researcher uncovered the incident. Initial reports suggest these breaches occurred as early as March 2013, yet were unreported until October 2013. The persistency of attacks and time to remediate are key contributors to low SecurityRatings in this industry.

· Finance Rates Highest

In spite of frequent cyber attacks on financial institutions, the finance sector rated the most favorable in terms of security effectiveness. Along with the known tactics employed by cyber criminals, this sector was also hit with several politically motivated DDoS attacks. One reason for the high SecurityRatings is that the companies assessed were quicker to respond to threats than their peers in other industries. Faster response time leads to less damage and loss. Due in part to the need to meet security and privacy regulations and the desire to stay out of news headlines for losing customer data, financial institutions tend to focus more executive level resources on IT security and risk management than other industries.

· Energy and Retail

The energy sector, which includes utilities and oil and gas companies, rated highly in Q4 2012, but fell sharply in the first half of 2013 when faced with extensive malware and botnet attacks. Not only was there an increase in the number of security incidents in Q1 2013, but energy companies were slow to respond to these incidents. However, in the third quarter of 2013, the energy industry's average effectiveness shows an upward trend, suggesting that they may be getting better at thwarting cyber attacks.

The retail sector, which excludes solely online retailers, also started out on an upward trend in Q4 2012, but then hit a rough patch in Q1 2013, showing that they continue to be an attractive target for cybercriminals seeking access to identity and financial information. The retailers included in this study faced an increase in botnet, spam, phishing and malware attacks Q1 2013, and took longer to remediate attacks as their frequency increased. The SecurityRatings of this group have remained relatively flat in the past two quarters, leaving much room for improvement.

About the BitSight Industry SecurityRatings

Industry SecurityRatings were created from the BitSight SecurityRating averages of over 70 U.S. based organizations in the Fortune 200 from October 2012 to September 2013. Below are explanations of the industry designations.

● Energy: utilities and oil & gas

● Finance: banking, investment, securities and financial services

● Retail: primarily brick and mortar organizations

● Technology: device, hardware, software manufacturers and services providers

To download a full copy of the BitSight Insight report, visit http://info.bitsighttech.com/industry-ratings. For more information on the BitSight Partner SecurityRating service, visit www.bitsighttech.com.

About BitSight Technologies

BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based security ratings. The company's SecurityRating Platform continuously analyzes vast amounts of external data on security behaviors in order to help organizations make timely risk management decisions. Based in Cambridge, MA, BitSight is backed by Commonwealth Capital Ventures, Flybridge Capital Partners, Globespan Capital Partners, and Menlo Ventures. For more information, please visit www.bitsighttech.com or follow @BitSight on Twitter.

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-27
WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)
PUBLISHED: 2021-01-27
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
PUBLISHED: 2021-01-27
A heap-based buffer overflow issue has been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to
PUBLISHED: 2021-01-27
Multiple out-of-bounds write issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to
PUBLISHED: 2021-01-27
Multiple out-of-bounds read issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to