Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Critical Vulnerabilities Discovered in Automated Tank Gauge Systems
Bitsight TRACE explores several critical vulnerabilities discovered in ATG systems and their inherent risk when exposed to the Internet.
The role of IT security manager, information security manager, or cybersecurity manager will vary depending on a number of factors — industry, business size, network sophistication, and so on. However, a person in this role can expect to be held to some or all of the following information security manager responsibilities:
What is a cyber resilience framework? Learn how your organization can better prepare for, respond to, and recover from a cyber attack.
Learn the basic principles of Zero Trust and how to apply them to your third-party risk management program to create more secure remote access connections.
Researchers from Bitsight and Curesec have jointly discovered a high-severity vulnerability — tracked as CVE-2023-29552 — in the Service Location Protocol (SLP).
What risks do mobile apps present to your business and how can you get ahead of these threats?
Imagine you've alerted your IT team to a critical infrastructure error plaguing your network. You ask them to drop their current work and focus on immediate remediation of this detected vulnerability. After further investigation, however, it is found to be a false positive.
Bitsight published research identifying exposed webcams. In light of that, Orgs must develop an understanding of how to handle the expanding attack surface.
How financial and security leaders can work together to protect their organizations in the wake of the recent crisis affecting Silicon Valley Bank (SVB).
Bitsight has identified thousands of organizations around the world using Internet-facing webcams and similar devices, finding many video and audio feeds susceptible to eavesdropping.
Bitsight teamed with Moody’s Investors Service to discuss the cybersecurity trends to watch in 2023 and how security leaders can adapt their programs to increase preparedness.
Take a look at our 2022 cybersecurity recap and trends and see what blogs our readers have been most interested in throughout the year.
New outsourcing opportunities may present as you build next year’s strategy, making Vendor Risk Management (VRM) critical for three main reasons.
A data breach can have financial, operational, and reputational impact, but how much does a data breach actually cost? Find out today.
Cyber risk is rising in Europe, the Middle East and Africa (EMEA), according to the latest analysis from Moody’s Investor Services (“Moody’s”). Read latest research.
Bitsight has discovered six severe vulnerabilities in a popular vehicle GPS tracker (MiCODUS MV720) potentially allowing hackers to track individuals without their knowledge, remotely disable fleets of corporate supply and emergency vehicles, abruptly stop civilian vehicles on dangerous highways, and more.