This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Uptime Institute acquires LEET Security to deliver cybersecurity rating system
The LEET rating system gives clients the ability to easily understand the nature and severity of cyber risks
NEW YORK — Uptime Institute completed its acquisition of LEET Security S.L. LEET Security provides an independent cybersecurity risk evaluation methodology and rating system that has been designed to specifically identify, characterize, and rate cybersecurity risk within any services utilizing digital infrastructure for any aspect of service delivery.
All organizations and their ICT service partners are under increasing pressure to secure their digital infrastructure in response to the complex and ever-evolving cyber risk threat landscape. The LEET Cyber Security rating system directly addresses the issue by giving clients the ability to easily understand the nature and severity of these risks. The clients can then take the appropriate steps to mitigate these risks and improve their organization’s security posture on a continuous basis therefore hardening their organization against cyber threats. This includes identifying systemic weaknesses and specific exposures and then building compensating security controls across both the internal and external “attack surface” that may exist in any digital services they use, whether this service is provisioned in-house or delivered via a third-party service provider.