Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Slicing through CISA’s KEV Catalog
![Blog Image KEV Research Announcement](/sites/default/files/styles/cta/public/2024/05/01/Blog%20Image%20KEV%20Research%20Announcement.png?itok=dUMFV8Tg)
Slicing through CISA’s KEV Catalog
Dive into the critical insights of CISA's Known Exploited Vulnerabilities (KEV) Catalog with Bitsight’s latest blog! Discover how KEVs, which signal urgent cybersecurity risks, are being tracked and mitigated across industries. Learn why addressing these vulnerabilities quickly is vital and how it impacts organizational security.
![third party breach](/sites/default/files/styles/4_3_small/public/2022/11/15/shutterstock_1407081185.jpg.webp?itok=H68LvNRh)
We are constantly evolving our offerings to meet customer needs and address market shifts. Read our blog to learn about our customer-first enhancements to the Bitsight for Third-Party Risk Management Platform.
![supplier](/sites/default/files/styles/4_3_small/public/2022/12/28/Shutterstock_2015833799.jpg.webp?itok=E7nWgJra)
Your vendors’ vendors can pose significant cyber risk to your organization. Learn more about fourth-party risk and how to manage it.
![fourth party supplier risk](/sites/default/files/styles/4_3_small/public/2022/12/16/Fourth%20Party%20Supplier%20Risk%2C%20SIZED.jpg.webp?itok=9pZMnFUC)
Gain visibility into fourth-party supplier risk, continuously monitor for emerging risks, and communicate program performance to stakeholders.
![third party vs fourth party](/sites/default/files/styles/4_3_small/public/2022/12/08/Third%20Party%20vs%20Fourth%20Party%20SIZED.jpg.webp?itok=oxa1p1VB)
Learn the difference between third-party vs. fourth-party risk and how you can extend your risk management program to cover both.
![FFIEC IT Handbook Updates: Business Continuity Is 2020 Focus](/sites/default/files/styles/4_3_small/public/migration/images/FFIEC_IT_Handbook_Updates_Business_Continuity_Is_2020_Focus_1.jpeg.webp?itok=aJm0WC0j)
In November 2019, the Federal Financial Institutions Examination Council (FFIEC) released an update to the Information Technology Examination Handbook (IT Handbook). This handbook is a guide for examiners at its member agencies, which include the FRB, FDIC, NCUA, OCC, and CFPB.
![Guide: Fourth-Party Cyber Risk & Management](/sites/default/files/styles/4_3_small/public/migration/images/Fourth%2520party%2520blog%2520post_1.png.webp?itok=OWaBUUiV)
In today’s interconnected world, supply chains are growing exponentially. As a result, third-party risk has become a big focus for senior management. But what about the vendors that your suppliers rely on and the threat of fourth-party risk?
![bitsight-blog](/sites/default/files/styles/4_3_small/public/2024/05/24/bitsight-blog.jpg.webp?itok=-q3o2lKI)
The importance of monitoring third-party vendors has increased in recent years with the numerous data breaches originating in vendor systems. You have likely heard from news coverage of major breaches that because of how interconnected organizations are today, it’s critical to make sure your vendors aren’t leaving your data exposed.
![bitsight-blog](/sites/default/files/styles/4_3_small/public/2024/05/24/bitsight-blog.jpg.webp?itok=-q3o2lKI)
Written with the assistance of Dan Dahlberg, Ethan Geil, and Ross Penkala.