Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Slicing through CISA’s KEV Catalog
![Blog Image KEV Research Announcement](/sites/default/files/styles/cta/public/2024/05/01/Blog%20Image%20KEV%20Research%20Announcement.png?itok=dUMFV8Tg)
Slicing through CISA’s KEV Catalog
Dive into the critical insights of CISA's Known Exploited Vulnerabilities (KEV) Catalog with Bitsight’s latest blog! Discover how KEVs, which signal urgent cybersecurity risks, are being tracked and mitigated across industries. Learn why addressing these vulnerabilities quickly is vital and how it impacts organizational security.
![third party vs fourth party](/sites/default/files/styles/4_3_small/public/2022/12/08/Third%20Party%20vs%20Fourth%20Party%20SIZED.jpg.webp?itok=oxa1p1VB)
Learn the difference between third-party vs. fourth-party risk and how you can extend your risk management program to cover both.
![Representation of expanding digital ecosystem for cyber risk reduction](/sites/default/files/styles/4_3_small/public/2022/09/29/Cyber%20Risk%20Reduction.jpg.webp?itok=o39aLaUF)
Discover five practical cyber risk reduction strategies including understanding your attack surface, continuous monitoring, keeping software updated, and more.
![Vendors, Diligence, Continuous monitoring](/sites/default/files/styles/4_3_small/public/2022/08/11/vendor%20due%20diligence%20process%20sized.jpg.webp?itok=bCzmtSzT)
Learn how to combat growing third-party cyber threats with automation and an effective vendor due diligence process.
![What is a botnet, image shows a representation of a botnet](/sites/default/files/styles/4_3_small/public/2022/06/24/What%20is%20a%20Botnet%2C%20SIZED.jpg.webp?itok=iWqqujCC)
What is a botnet? A botnet is a collection of networked devices that are infected by malware and hijacked to carry out scams and data breaches.
![Cyber Preparedness](/sites/default/files/styles/4_3_small/public/2022/05/31/Cyber%20Preparedness.jpg.webp?itok=uCewOJx-)
Learn about the four pillars of cyber preparedness and why it’s everyone’s responsibility to get involved.
![Attack surface reduction examples, person working on computer](/sites/default/files/styles/4_3_small/public/2022/05/16/Attack%20Surface%20Reduction%20Examples%2C%20SIZED.jpg.webp?itok=oO7CXqJU)
Explore actionable attack surface reduction examples that can reduce risk across your expanding digital environment.
![Cyber insurance underwriting evolution and expectations](/sites/default/files/styles/4_3_small/public/2022/04/04/Cyber%20Insurance%20Underwriting%2C%20Sized.jpg.webp?itok=sXAliu2l)
What is cyber insurance underwriting, how has it evolved, and what you can expect when you apply for cyber insurance.
![Vendor security audit](/sites/default/files/styles/4_3_small/public/2022/03/21/Vendor%20Security%20Audit%2C%20Sized.jpg.webp?itok=31UMcGaI)
A vendor security audit can reduce third-party risk. Learn how you can mature your assessment process while saving time and resources.
![Cyber intrusion, hacker looking at your network](/sites/default/files/styles/4_3_small/public/2022/02/07/Cyber%20Intrusion%2C%20Sized.jpg.webp?itok=_H7TnpQw)
Learn how to reduce the threat of cyber intrusion with a detection and prevention approach grounded in continuous monitoring.
![third party ransomware](/sites/default/files/styles/4_3_small/public/2022/02/01/shutterstock_1724155270.jpg.webp?itok=lVLHNvSn)
Learn what the disturbing ransomware trends means for your organization and third-party vendors.
![mitigate risk](/sites/default/files/styles/4_3_small/public/2021/12/29/shutterstock_1924087544.jpg.webp?itok=X0KojRun)
Cyber risk mitigation and remediation are often talked about in the same terms. But they are different. Learn how you can optimize both.
![cyber risk banner](/sites/default/files/styles/4_3_small/public/2021/12/08/cyber%20risk%20banner.jpg.webp?itok=FiIIwzUe)
You can’t reduce the cyber risks faced by your organization if you don’t know what you’re up against. That’s the purpose of a vulnerability probe.
![Three Ways To Improve Your Cyber Risk Monitoring Tools](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_1182594889_1.jpg.webp?itok=jmebBYdU)
Whether your organization is just beginning to develop your security performance management systems, or you already have a mature and established program in place, there is always room to innovate and improve the cyber risk monitoring tools you use.
![Enhance Vulnerability Mitigation With Security Performance Management](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_546191650_1.jpg.webp?itok=UtrMRyeZ)
Did you know that 60% of breaches involve vulnerabilities for which a patch was available but not applied? Now, as business-targeted cyber attacks are on the rise, the ability to mitigate security vulnerabilities quickly and effectively is more important than ever. With malicious actors constantly on the hunt to discover any weaknesses within your infrastructure, it’s critical that you have the tools and insights you need to identify and defend against all possible exploits.
![How Continuous Monitoring Revolutionizes Third-Party Risk Management](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_1499306735_1.jpg.webp?itok=yqaWCBap)
If you’re running a third-party risk management program, you’re probably no stranger to pressure. Between business owners demanding vendors be onboarded ever faster, to the ever present threat of a data breach, there is a lot to worry about. One of the biggest concerns in today’s security environment is the constantly evolving threat of a breach - especially with vendors.