Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Slicing through CISA’s KEV Catalog
![Blog Image KEV Research Announcement](/sites/default/files/styles/cta/public/2024/05/01/Blog%20Image%20KEV%20Research%20Announcement.png?itok=dUMFV8Tg)
Slicing through CISA’s KEV Catalog
Dive into the critical insights of CISA's Known Exploited Vulnerabilities (KEV) Catalog with Bitsight’s latest blog! Discover how KEVs, which signal urgent cybersecurity risks, are being tracked and mitigated across industries. Learn why addressing these vulnerabilities quickly is vital and how it impacts organizational security.
![Managing Security Risk in Mergers & Acquisitions](/sites/default/files/styles/4_3_small/public/2022/06/03/MA_Blog_Post_Statistical_Analysis_1.jpg.webp?itok=9UDVRI5e)
Every year, companies spend billions of dollars on mergers and acquisitions. (The value of worldwide M&A deals in 2014 totaled $3.5 trillion.) Managing risk throughout the process is an important element of any merger, but there's one area of risk management that hasn't had the attention it deserves.
![global digital perimeter](/sites/default/files/styles/4_3_small/public/2022/02/23/shutterstock_1643121439.jpg.webp?itok=2h-byzWy)
As cyber attacks evolve and your attack surface increases, learn how you can protect your digital perimeter.
![Cyber Risk Considerations During the M&A Process](/sites/default/files/styles/4_3_small/public/migration/images/mergers-acquisitions-nacd-blog-image_1.jpg.webp?itok=hOODsYci)
Data breaches are a constant in today’s headlines, but in recent years the risk has been front and center of some of the most significant M&A deals. In 2017, Verizon discounted its acquisition price by $350 million when Yahoo belatedly disclosed that it experienced several massive breaches. And in November 2018, Marriott publicly disclosed that Starwood’s guest reservation database — containing hundreds of millions of personal records — had been compromised since 2014, prior to the Marriott acquisition. These incidents — and countless others — raise critical questions. How should Boards be thinking about cyber risk in the acquisition process? What steps should they take to address this risk prior to the acquisition?
![4 Reasons To Use Security Ratings Before Your Next Acquisition](/sites/default/files/styles/4_3_small/public/migration/images/securityratings_acquisition_full_1.jpg.webp?itok=dlkM46c2)
For years, cybersecurity was considered a “check-the-box” discussion during the merger and acquisition (M&A) process. It was almost always examined to ensure there weren’t any glaring issues or major red flags—but there wasn’t a whole lot of care or thought put into it.