Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Slicing through CISA’s KEV Catalog
![Blog Image KEV Research Announcement](/sites/default/files/styles/cta/public/2024/05/01/Blog%20Image%20KEV%20Research%20Announcement.png?itok=dUMFV8Tg)
Slicing through CISA’s KEV Catalog
Dive into the critical insights of CISA's Known Exploited Vulnerabilities (KEV) Catalog with Bitsight’s latest blog! Discover how KEVs, which signal urgent cybersecurity risks, are being tracked and mitigated across industries. Learn why addressing these vulnerabilities quickly is vital and how it impacts organizational security.
![BitSight identifies thousands of organizations using Internet-facing and exposed webcams blog hero image](/sites/default/files/styles/4_3_small/public/2023/02/16/BitSight%20identifies%20thousands%20of%20organizations%20using%20Internet-facing%20and%20exposed%20webcams.jpg.webp?itok=R6D_uHcs)
Bitsight has identified thousands of organizations around the world using Internet-facing webcams and similar devices, finding many video and audio feeds susceptible to eavesdropping.
![7 Cyber Security KPIs That Will Resonate On A Cybersecurity Dashboard For Your Board of Directors](/sites/default/files/styles/4_3_small/public/2023/06/22/7%20Cyber%20Security%20KPIs%20That%20Will%20Resonate%20On%20A%20Cybersecurity%20Dashboard%20For%20Your%20Board%20of%20Directors.jpg.webp?itok=XIyINUWV)
Want to capture your board’s attention? Add these seven KPIs to your cybersecurity dashboard.
![A Security Operations Center Report Template for Executive Buy-in](/sites/default/files/styles/4_3_small/public/migration/images/AdobeStock_168596068_1.jpeg.webp?itok=flBu9F6E)
A monthly or quarterly report is a great way to summarize a SOC’s performance and uncover insights for executive leadership. But as a security and risk manager or executive, what information should you request from the managers who report to you?
![2023 cybersecurity trends](/sites/default/files/styles/4_3_small/public/2023/01/05/2023%20Cybersecurity%20Trends%2C%20SIZED.jpg.webp?itok=ZeCV0pCH)
Bitsight teamed with Moody’s Investors Service to discuss the cybersecurity trends to watch in 2023 and how security leaders can adapt their programs to increase preparedness.
![2022 cybersecurity recap blog](/sites/default/files/styles/4_3_small/public/2022/12/15/Top%205%20Topics%20from%202022.jpg.webp?itok=uoe3lHkO)
Take a look at our 2022 cybersecurity recap and trends and see what blogs our readers have been most interested in throughout the year.
![why vendor risk management is critical](/sites/default/files/styles/4_3_small/public/2022/12/06/3-reasons-vendor-risk-management-scaled-1-2048x1536_0.jpeg.webp?itok=R_n_b7Oi)
New outsourcing opportunities may present as you build next year’s strategy, making Vendor Risk Management (VRM) critical for three main reasons.
![cost of a data breach](/sites/default/files/styles/4_3_small/public/2022/11/24/cost%20of%20a%20data%20breach.jpg.webp?itok=z8lukRAb)
A data breach can have financial, operational, and reputational impact, but how much does a data breach actually cost? Find out today.
![European Cyber Risk is Rising: Moodys - Blog](/sites/default/files/styles/4_3_small/public/2022/10/26/European%20Cyber%20Risk%20is%20Rising-Moodys.jpg.webp?itok=JnvhxuAf)
Cyber risk is rising in Europe, the Middle East and Africa (EMEA), according to the latest analysis from Moody’s Investor Services (“Moody’s”). Read latest research.
![cybersecurity vs information security](/sites/default/files/styles/4_3_small/public/2022/01/03/Cybersecurity%20vs%20Information%20Security%2C%20Sized.jpg.webp?itok=QpuN0Sop)
Is there a difference between cybersecurity vs. information security? Learn more about the distinctions between the two areas, where they overlap, and how both have evolved.
![BitSight Finds Critical Vulnerabilities in Popular GPS Tracker](/sites/default/files/styles/4_3_small/public/2022/07/15/BitSight%20Finds%20Critical%20Vulnerabilities%20in%20Popular%20GPS%20Tracker_New.jpg.webp?itok=AADpgFSJ)
Bitsight has discovered six severe vulnerabilities in a popular vehicle GPS tracker (MiCODUS MV720) potentially allowing hackers to track individuals without their knowledge, remotely disable fleets of corporate supply and emergency vehicles, abruptly stop civilian vehicles on dangerous highways, and more.
![cybersecurity and investing](/sites/default/files/styles/4_3_small/public/2022/06/23/cybersecurity%20and%20investing_sized.jpg.webp?itok=4a1G2vr0)
Investors are worried about cybersecurity—and for good reason. Yet despite growing concerns and the criticality of the issue, the dialogue between companies and investors need significant improvement. Here's why.
![Vulnerability alert](/sites/default/files/styles/4_3_small/public/2023/04/26/Vulnerability%20alert-min.jpg.webp?itok=PREnq-Uj)
Atlassian Confluence has been impacted by vulnerability CVE-2022-26134 allowing for ransomware deployment, data theft, & more. See Bitsight's findings & analysis.
![Global distribution of Emotet infected systems](/sites/default/files/styles/4_3_small/public/2022/05/19/Global%20distribution%20of%20infected%20systems-min.png.webp?itok=uiwqItNT)
In November 2021, a new version of the Emotet botnet emerged. How did this happen? What is the botnet doing today? And how can organizations avoid becoming victims? Get the answers and more.
![Gartner Predicts Cybersecurity, 4 insights for 2022](/sites/default/files/styles/4_3_small/public/2022/03/29/Announcing%20Gartner%20Predicts%2C%20Sized.jpg.webp?itok=td-_OEmE)
The latest report from Gartner® outlines several key areas that leaders need to pay close attention to if they want to create more resilient, trusted programs.
![UK cyber resilience cyber security strategy webpage](/sites/default/files/styles/4_3_small/public/2022/02/28/UK%20Cyber%20Resilience%2C%20Sized.jpg.webp?itok=EZJ1xllP)
The UK Cyber Resilience 2022 strategy is a remarkable blueprint for any organization looking to improve cyber resilience. What lessons can be learned?