Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Slicing through CISA’s KEV Catalog
![Blog Image KEV Research Announcement](/sites/default/files/styles/cta/public/2024/05/01/Blog%20Image%20KEV%20Research%20Announcement.png?itok=dUMFV8Tg)
Slicing through CISA’s KEV Catalog
Dive into the critical insights of CISA's Known Exploited Vulnerabilities (KEV) Catalog with Bitsight’s latest blog! Discover how KEVs, which signal urgent cybersecurity risks, are being tracked and mitigated across industries. Learn why addressing these vulnerabilities quickly is vital and how it impacts organizational security.
![weighted scale](/sites/default/files/styles/4_3_small/public/2023/07/14/Not%20all%20analytics%20are%20created%20equal.jpeg.webp?itok=CWxIzEAT)
Not all cybersecurity analytics are useful. Some are built on data and methodology that is scientifically shown to be correlated with risks and incidents.
![What Is Cybersecurity Compliance? An Industry Guide](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_1159332316.jpg.webp?itok=2tK78-jI)
If you operate in specific sectors, cybersecurity maturity is more than a best practice, it’s a regulatory requirement. These regulations are complex and constantly changing. To help you better understand your organization's regulatory environment and the standards and controls they stipulate, let's break down key cyber compliance regulations by industry.
![5 Percent Rule Blog](/sites/default/files/styles/4_3_small/public/2023/04/28/5%20Percent%20Rule%20Blog.jpg.webp?itok=jwGrKm2Y)
Here’s the important question: With cyber vulnerabilities rising and presenting increasingly serious risks, are organizations doing enough to fight back? The answer might surprise you.
![Vendor, Security posture](/sites/default/files/styles/4_3_small/public/2022/07/15/How%20to%20Measure%20Your%20Vendors%E2%80%99%20Security%20Posture%20sized.jpg.webp?itok=sxgKuouB)
Learn how to onboard vendors securely and at speed with automated, data-driven insights into your vendors’ security postures.
![Evidence-Based Strategies for Ransomware Prevention](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_1044801037_0.jpg.webp?itok=i_B0b8TI)
Ransomware is getting more sophisticated, and 1 in 4 breaches involve ransomware. Bitsight analyzed hundreds of ransomware events to estimate the relative probability that an organization will experience a ransomware event. Four areas bubble to the top.
![Cybersecurity risk remediation plan, people at a conference table discussing security](/sites/default/files/styles/4_3_small/public/2022/01/03/Risk%20Remediation%20Plan%2C%20Sized.jpg.webp?itok=oE46OAzc)
Does your organization have a cybersecurity risk remediation plan? Follow these 5 tips for crafting one.
![Top Emerging Cybersecurity Threats](/sites/default/files/styles/4_3_small/public/2023/04/27/Top%20Emerging%20Cyber%20Threats%2C%20SIZED%20%281%29.jpg.webp?itok=epdYvm7s)
New research sheds light on the top emerging cybersecurity threats facing organizations. We summarize these findings and recommend mitigation actions.
![5 Steps to Creating a Cyber Security Roadmap](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_492340057.png.webp?itok=GQgLkX2o)
The recent rise in ransomware attacks and business-halting data breaches has made it clear that your organization must prioritize cyber security performance. But ad hoc security controls and defensive measures are not the answer. Instead, you need a strategic, risk-based approach with a cyber security road map as your guide.
![How to Conduct a Cloud Security Audit: A 5-Step Checklist](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_1722461929%2520%25281%2529_0.jpg.webp?itok=YO-UIv_V)
For the first time, cloud security breaches and incidents are more commonplace than on-premises attacks. According to the 2021 Verizon Data Breach Investigations Report (DBIR), in 2020, 73% of cyberattacks involved cloud assets, compared to only 27% in the previous year.
![Cybersecurity Board Report](/sites/default/files/styles/4_3_small/public/2023/02/23/Shutterstock_222195631%20%281%29.jpg.webp?itok=OJW9TsS4)
Learn what three key metrics can help you create a cybersecurity board report that tells a good story and resonates with your board.
![what is tprm](/sites/default/files/styles/4_3_small/public/2023/02/10/what%20is%20tprm.jpg.webp?itok=RlxIAxxc)
Third party risk management is trending following major data breaches affecting organizations through their vendors. But what is TPRM?
![Cyber insurance guiding security program](/sites/default/files/styles/4_3_small/public/2023/01/10/Practitioner%27s%20Corner_%20Cyber%20Insurance%2C%20SIZED.jpg.webp?itok=S4MqJQp4)
While many organizations look at cyber insurance as a way to transfer risk and mitigate financial losses, the assessment process used by cyber insurers can help shape your security program for the better.
![system hacked](/sites/default/files/styles/4_3_small/public/2022/11/18/Shutterstock_1916985977%20%281%29.jpg.webp?itok=HLYjHJLd)
A study reveals the correlation between these security flaws and the likelihood of cybersecurity incidents. Learn more.
![HTTP Redirect](/sites/default/files/styles/4_3_small/public/2023/01/04/HTTP%20Redirect%2C%20SIZED.jpg.webp?itok=lbMNtt1A)
HTTP redirects are a common technique to ensure website visitors see the same content when they type different, yet related, domains in the URL bar of their browser. But any connection to an HTTP site comes with risk.
![why vendor risk management is critical](/sites/default/files/styles/4_3_small/public/2022/12/06/3-reasons-vendor-risk-management-scaled-1-2048x1536_0.jpeg.webp?itok=R_n_b7Oi)
New outsourcing opportunities may present as you build next year’s strategy, making Vendor Risk Management (VRM) critical for three main reasons.