Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.

Critical Vulnerabilities Discovered in Automated Tank Gauge Systems
Bitsight TRACE explores several critical vulnerabilities discovered in ATG systems and their inherent risk when exposed to the Internet.

Bitsight and Lokker have partnered together to bring the Cyber Insurance industry’s first unified data privacy risk and cybersecurity underwriting solution to market.

The 2025 Bitsight Ratings Algorithm Update will be ready for preview on April 8. Learn more about what changes to the Bitsight rating are coming in 2025.

Your supply chain is bigger—and riskier—than you think. The Bitsight TRACE team uncovers the "Critical 99" and hidden vulnerabilities. Read the findings now.

Bitsight TRACE analyzes the March 10, 2025 DDoS attack on X, linking it to IoT botnets and misconfigurations. Dark Storm claims responsibility, but was it them?

Bitsight's Critical Asset Management makes it easy to target specific third-party cyber assets for continuous monitoring, individually or in bulk. Learn more.

Secure your DNS servers to enhance speed and protect against cyber threats. Learn how DNS works, its role in security, and best practices for protection.

Explore key cybersecurity data gathering techniques, from OSINT to threat intelligence feeds, to find vulnerabilities, anticipate threats, & enhance defenses.

Stealer malware (infostealer) is growing as a top avenue for identify credential theft. Learn what stealer malware is, how it works, & how to safeguard data.

The OSINT Framework assists analysts in gathering & organizing open-source information. Learn the 5 steps of OSINT, sources, tools, and how to use it.

Here’s what we see as the most important questions that tech buyers should be asking about how their vendors use AI today.

Cybercrime is illegal activity that involves networks or digital devices. Learn about types of cybercrime including DoS attacks, supply chain attacks, & more.

This article provides details on how Bitsight TRACE addressed CVE-2024-23897, an arbitrary file read vulnerability that affects Jenkins.

Crypto fraud detection is the process of identifying & preventing fraudulent activities within cryptocurrency transactions & platforms. Learn how it works now.

SOX compliance requires companies to focus on 7 critical areas: from internal controls to cybersecurity measures. Find a full checklist for SOX compliance.

Join Ben Edwards, as he takes a brief look back at one of the stories that was most interesting to him as a security data nerd from 2024.