<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cher&#039;s canvas &#187; BitSight</title>
	<atom:link href="https://jollyvip.com/research/tag/bitsight/feed/" rel="self" type="application/rss+xml" />
	<link>https://jollyvip.com/research</link>
	<description>Exploring the messy confluence of technology and people (law)</description>
	<lastBuildDate>Mon, 20 Feb 2023 16:44:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.1</generator>
		<item>
		<title>A new (and useful?) way to measure security risk &#8211; security ratings</title>
		<link>https://jollyvip.com/research/2014/08/15/a-new-and-useful-way-to-measure-security-risk-security-ratings/</link>
		<comments>https://jollyvip.com/research/2014/08/15/a-new-and-useful-way-to-measure-security-risk-security-ratings/#comments</comments>
		<pubDate>Fri, 15 Aug 2014 01:19:05 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Extracts]]></category>
		<category><![CDATA[BitSight]]></category>
		<category><![CDATA[security ratings]]></category>

		<guid isPermaLink="false">http://jollyvip.com/research/?p=613</guid>
		<description><![CDATA[Metric for security risk as presented by BitSight&#8217;s Transforming IT Risk Management With Security Ratings Two slides that caught my attention; The security ratings methodology Insight into third party networks]]></description>
			<content:encoded><![CDATA[<p>Metric for security risk as presented by <a href="https://www.brighttalk.com/webcast/5418/120387" title="BitSight recorded webinar - Transforming IT Risk Management With Security Ratings" target="_blank">BitSight&#8217;s Transforming IT Risk Management With Security Ratings </a></p>
<p>Two slides that caught my attention;<br />
<a href="http://jollyvip.com/research/files/2014/08/Screen-Shot-2014-08-15-at-02.10.32.png"><img src="http://jollyvip.com/research/files/2014/08/Screen-Shot-2014-08-15-at-02.10.32.png" alt="" title="Screen Shot 2014-08-15 at 02.10.32" width="534" height="401" class="aligncenter size-full wp-image-614" />The security ratings methodology</a></p>
<p><a href="http://jollyvip.com/research/files/2014/08/Screen-Shot-2014-08-15-at-02.08.27.png"><img src="http://jollyvip.com/research/files/2014/08/Screen-Shot-2014-08-15-at-02.08.27.png" alt="" title="Screen Shot 2014-08-15 at 02.08.27" width="1280" height="800" class="aligncenter size-full wp-image-615" />Insight into third party networks</a></p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/research/2014/08/15/a-new-and-useful-way-to-measure-security-risk-security-ratings/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
