Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.

Critical Vulnerabilities Discovered in Automated Tank Gauge Systems
Bitsight TRACE explores several critical vulnerabilities discovered in ATG systems and their inherent risk when exposed to the Internet.

La mise en œuvre d'un plan de réponse aux incidents de cybersécurité peut vous aider à gérer efficacement un cyber-événement, à réduire les perturbations de votre activité et à garantir la conformité.

What is adaptive security? Explore the benefits of this approach to cyber risk reduction and how your organization can get started.

A monthly or quarterly report is a great way to summarize a SOC’s performance and uncover insights for executive leadership. But as a security and risk manager or executive, what information should you request from the managers who report to you?

Bitsight put together 5 tips for board members to manage cyber risk going into 2024. Read the blog to see how the modern corporate board thinks about cyber risk.

One of the biggest questions in cybersecurity now has an answer… and the implications are significant for investors, policymakers, corporate executives, and cybersecurity professionals alike.

Learn how to discover shadow IT with tools like network audits, CASB tools, and train staff to identify and manage hidden tech risks effectively.

The retail industry has always been a favorite target of cyber criminals. We all remember major data breaches like those that affected Target, TJX, and Home Depot — but the truth is that retail security threats have been a daily concern of retailers for a long time.

Cyberattacks on state and local governments are on the rise. In 2020, more than 100 government agencies, including municipalities, were targeted with ransomware – an increasingly popular attack vector.

Today, 59% of data breaches originate with third-party vendors. And, as globalization brings more interconnected supply chains, that number is anticipated to grow.

These days, we often hear the word “quarantine” in everyday conversations--but quarantining takes on a different meaning when it comes to protecting your network.
Often, when we discuss quarantining from a cyber security perspective we’re referring to network segmentation cyber security. But what is network segmentation, and is it the right approach for your organization? The answer to the first part is easy. The second is a bit more complicated.
Often, when we discuss quarantining from a cyber security perspective we’re referring to network segmentation cyber security. But what is network segmentation, and is it the right approach for your organization? The answer to the first part is easy. The second is a bit more complicated.

We are rolling out a new enhanced capability with innovative techniques to improve attribution of customer and corporate infrastructure associated with IT infrastructure businesses.

Cybersecurity governance in 2023 stood out as one of the most eventful in a very long time. Here are five developments that will push CISOs and risk leaders to up their game in 2024.

As we look ahead to 2024, this is a great time to survey the damage of late to understand how enterprise risk postures need to adapt.

Cybersecurity is always changing, and it's up to CISOs to keep up with the times. There are plenty of blogs and newsletters offering information on new developments in data security, but not all of them are worth following.

The chief information officer (CIO) has traditionally owned IT security — and in recent years, cybersecurity has become a larger part of the modern CIO’s responsibility. Cybersecurity is a company-wide issue — and it’s everyone’s responsibility to manage it appropriately — but today, the CIO must act as a steward for the data and ensure that the right controls and processes are in place for data security.