Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Slicing through CISA’s KEV Catalog
![Blog Image KEV Research Announcement](/sites/default/files/styles/cta/public/2024/05/01/Blog%20Image%20KEV%20Research%20Announcement.png?itok=dUMFV8Tg)
Slicing through CISA’s KEV Catalog
Dive into the critical insights of CISA's Known Exploited Vulnerabilities (KEV) Catalog with Bitsight’s latest blog! Discover how KEVs, which signal urgent cybersecurity risks, are being tracked and mitigated across industries. Learn why addressing these vulnerabilities quickly is vital and how it impacts organizational security.
![Cyber Resilience Metrics](/sites/default/files/styles/4_3_small/public/2022/05/24/Cyber%20Resilience%20Metrics.jpg.webp?itok=kbz4TaC8)
To improve cyber resilience, you must first measure it. Learn the 4 metrics to track to gain insights into your cybersecurity posture.
![quantitative risk](/sites/default/files/styles/4_3_small/public/2022/11/11/shutterstock_758356729.jpg.webp?itok=LaIFQMW_)
Quantitative risk assessments in cybersecurity draw on data and analytics to help you understand the probability of risk and inform strategic management decisions.
![supply chain resilience](/sites/default/files/styles/4_3_small/public/2022/09/16/shutterstock_2072769434.jpg.webp?itok=Ha6ObOvF)
Learn how to improve supply chain resilience and combat third-party risk through continuous, automated monitoring of your vendors’ risk postures.
![Balancing risk and compliance management](/sites/default/files/styles/4_3_small/public/2022/03/14/Risk%20vs%20Compliance.jpg.webp?itok=vdYEEA3E)
Compliance vs. Risk management. How your organization can unify its efforts to ensure cyber resilience.
![Cyber Risk Protection and Resilience Planning for Boards](/sites/default/files/styles/4_3_small/public/2023/05/31/Cyber-Risk-Protection-and-Resilience-Planning-for-Boards.jpg.webp?itok=XT056oOG)
Focus on cybersecurity is critical for boards, from both an investor and an operational perspective. Here are cybersecurity questions directors should be asking.
![what is malware](/sites/default/files/styles/4_3_small/public/2022/06/13/shutterstock_1326113375.jpg.webp?itok=1HZUZvHB)
Malware can gain entry to your network in many ways. Once malware has penetrated a network, threat actors can use it to steal information, encrypt systems, spy on users, and remove files. Learn how to prevent dangerous malware.
![cybersecurity baseline](/sites/default/files/styles/4_3_small/public/2023/06/05/cybersecurity%20baseline.jpeg.webp?itok=ZD1qDb6M)
Let’s look at how you can establish a cybersecurity baseline that works for your unique risks, industry, and business.
![SOC Cyber Vulnerability Awareness](/sites/default/files/styles/4_3_small/public/2023/04/13/security%20operations%20center.jpg.webp?itok=WpC19SUq)
To be effective as a security leader you must find ways to help your SOC teams improve cyber vulnerability awareness and time to remediate. Let’s explore how.
![resilience framework](/sites/default/files/styles/4_3_small/public/2022/03/08/shutterstock_1997301182.jpg.webp?itok=8tI09jTU)
What is a cyber resilience framework? Learn how your organization can better prepare for, respond to, and recover from a cyber attack.
![prevent third party attacks](/sites/default/files/styles/4_3_small/public/2023/01/20/Shutterstock_1357340402.jpg.webp?itok=tqmJ0ZAS)
Today, third-party data breaches pose the greatest cyber risk. Learn about the biggest breaches and steps you can take to protect your organization.
![How to influence cyber insurance coverage](/sites/default/files/styles/4_3_small/public/2022/10/19/Cyber%20Insurance%20Influence%2C%20SIZED.jpg.webp?itok=iFwmqDV5)
Although Bitsight cannot influence the risk appetite of an insurance company, we can help you understand your cyber hygiene while proving to insurers that you are actively invested in your security posture, which influences the coverage decision.
![vendor risk management ransomware](/sites/default/files/styles/4_3_small/public/2021/12/06/ransomware-blog.jpg.webp?itok=58waN1-I)
In 2021, ransomware attacks on government agencies globally increased by 1,885% over 2020 attacks, and the trends are continuing so far in 2022. Learn how to protect your organization from ransomware with three best practices.
![cyber risk mitigation](/sites/default/files/styles/4_3_small/public/2021/11/16/cyberrisk%20mitigation.jpg.webp?itok=bH50Ze-R)
The federal government is using every tool possible to deter and disrupt retaliatory cyberattacks against critical national infrastructure. With the Strengthening American Cybersecurity Act, agencies are required to report cybersecurity incidents within a 72 hour period. Learn more.
![State of Cyber Resilience](/sites/default/files/styles/4_3_small/public/2022/05/09/State%20of%20Cyber%20Resilience%2C%20SIZED.jpg.webp?itok=ttCWjcFs)
Learn what you can do to defend against cyber attacks and achieve a state of cyber resilience.