Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Slicing through CISA’s KEV Catalog
![Blog Image KEV Research Announcement](/sites/default/files/styles/cta/public/2024/05/01/Blog%20Image%20KEV%20Research%20Announcement.png?itok=dUMFV8Tg)
Slicing through CISA’s KEV Catalog
Dive into the critical insights of CISA's Known Exploited Vulnerabilities (KEV) Catalog with Bitsight’s latest blog! Discover how KEVs, which signal urgent cybersecurity risks, are being tracked and mitigated across industries. Learn why addressing these vulnerabilities quickly is vital and how it impacts organizational security.
![State of Cyber Resilience](/sites/default/files/styles/4_3_small/public/2022/05/09/State%20of%20Cyber%20Resilience%2C%20SIZED.jpg.webp?itok=ttCWjcFs)
Learn what you can do to defend against cyber attacks and achieve a state of cyber resilience.
![attack vector vs attack surface](/sites/default/files/styles/4_3_small/public/2022/05/02/Attack%20vector%20vs%20Attack%20surface%20SIZED.jpg.webp?itok=2hAQAzR0)
The attack surface encompasses the digital assets that a hacker can exploit. An attack vector is the method they use to breach the attack surface.
![Keys to the Kingdom: Single Sign-On (SSO) is Under Attack](/sites/default/files/styles/4_3_small/public/2022/04/11/Keys%20to%20the%20Kingdom%2C%20%20Sized.jpg.webp?itok=lVMhnDiC)
This article contains tips for security and risk professionals to manage risk from their Single Sign-On (SSO) providers and better protect their users’ credentials.
![Gartner Predicts Cybersecurity, 4 insights for 2022](/sites/default/files/styles/4_3_small/public/2022/03/29/Announcing%20Gartner%20Predicts%2C%20Sized.jpg.webp?itok=td-_OEmE)
The latest report from Gartner® outlines several key areas that leaders need to pay close attention to if they want to create more resilient, trusted programs.
![Vendor security audit](/sites/default/files/styles/4_3_small/public/2022/03/21/Vendor%20Security%20Audit%2C%20Sized.jpg.webp?itok=31UMcGaI)
A vendor security audit can reduce third-party risk. Learn how you can mature your assessment process while saving time and resources.
![New BitSight Features for Security Performance Management SPM](/sites/default/files/styles/4_3_small/public/2022/02/28/New%20BitSight%20Features%20for%20SPM%20SIZED.png.webp?itok=h8kBvfpy)
New features in Bitsight's Security Performance Management (SPM) solution help you quickly get better insights of your attack surface so you reduce the risk of data breaches, ransomware, and cyber attacks.
![global digital perimeter](/sites/default/files/styles/4_3_small/public/2022/02/23/shutterstock_1643121439.jpg.webp?itok=2h-byzWy)
As cyber attacks evolve and your attack surface increases, learn how you can protect your digital perimeter.
![third party ransomware](/sites/default/files/styles/4_3_small/public/2022/02/01/shutterstock_1724155270.jpg.webp?itok=lVLHNvSn)
Learn what the disturbing ransomware trends means for your organization and third-party vendors.
![Cybersecurity in banking, showing people using contactless banking](/sites/default/files/styles/4_3_small/public/2022/01/24/3%20Cybersecurity%20Banking%20Trends%202022%2C%20Sized.jpg.webp?itok=h3nTzMiz)
Rapidly evolving risk and the digitization of banking is creating new threats. Here are three cybersecurity in banking trends to watch this year.
![Drawn image of sharing files between different vendors](/sites/default/files/styles/4_3_small/public/2022/01/10/Dos%20and%20Donts%20of%20Data%20Sharing%2C%20sized.jpg.webp?itok=bASZyxUT)
Learn how to protect your organization’s “crown jewels” with these do’s and don’ts of sensitive data sharing with vendors.
![Information risk management](/sites/default/files/styles/4_3_small/public/2022/01/10/Information%20Risk%20Management%2C%20sized.jpg.webp?itok=sdCY7OM4)
What is information risk management? Learn more about how the classic equation of threat x vulnerability x consequence helps inform your cybersecurity risk management strategy.
![Dora blog image 2](/sites/default/files/styles/4_3_small/public/2022/01/05/DORA%20blog%20image%202.png.webp?itok=r7P-SwY2)
The Digital Operational Resilience Act is set to go into action in early 2022. Learn how Bitsight can help your organization meet the compliance requirements.
![mitigate risk](/sites/default/files/styles/4_3_small/public/2021/12/29/shutterstock_1924087544.jpg.webp?itok=X0KojRun)
Cyber risk mitigation and remediation are often talked about in the same terms. But they are different. Learn how you can optimize both.
![Measuring an acceptable level of supply chain risk](/sites/default/files/styles/4_3_small/public/2021/12/23/Inherent%20Cyber%20Risk%2C%20Sized.jpg.webp?itok=Qeb3gWyw)
What does your organization consider an acceptable level of inherent cyber risk in its vendor portfolio? Learn how to establish that threshold and focus resources where they’re needed most.
![Cyber risk data, CISO presenting about cybersecurity and cyber risk to board of directors and c-suite](/sites/default/files/styles/4_3_small/public/2021/12/20/Cyber%20Risk%20Data%20Sized.jpg.webp?itok=24505oTu)
Learn how to use cyber risk data to protect your organization and its financial assets.