Skip to main content
Bitsight Knowledge Base Help Center home page
Security Performance Management
Continuous Monitoring
Vendor Risk Management
Trust Management Hub
Cyber Insurance
National Cybersecurity
  • Sign in
  • Submit a request
  1. Bitsight Knowledge Base
  2. Bitsight Data
  3. Data Collection Methods

Data Collection Methods

Techniques for collecting data that go into assessing Bitsight risk vectors, validation for the findings, and Vulnerability Detection data.

  • Crawlers
  • Requesting a New Vulnerability
  • Compromised Systems Events Proven to be Originating from Testing Environments
  • Threat Research Process
  • Reporting a Public Disclosures Event
  • Data Collection Methods Overview
  • Types of Collected Data
  • Honeypot
  • Sinkhole
  • Spam Trap
  • How Vulnerability Detection Data is Collected
  • How is the Botnet Infections Risk Vector Observed?
  • How is the Spam Propagation Risk Vector Observed?
  • How is the Malware Servers Risk Vector Observed?
  • How is the Unsolicited Communications Risk Vector Observed?
  • How is the Potentially Exploited Risk Vector Observed?
  • How is the TLS/SSL Certificates Risk Vector Observed?
  • How is the Open Ports Risk Vector Observed?
  • How are the Desktop Software and Mobile Software Risk Vectors Observed?
  • How is the Mobile Application Security Risk Vector Observed?
  • Mobile Application Analysis
  • Mobile Application Analysis: Android
  • Mobile Application Analysis: iOS
  • Understanding and Troubleshooting Web Application Security Scanning
  • How is the File Sharing Risk Vector Observed?
  • How is the Exposed Credentials Risk Vector Observed?
  • How is Public Disclosures Data Collected?
  • What triggers a port scanner event?

Contents © 2025 BitSight Technologies, Inc. ("Bitsight")

Privacy Policy | Disclaimer | Terms and Conditions | Contact Bitsight | Bitsight Academy | Bitsight Support