Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Critical Vulnerabilities Discovered in Automated Tank Gauge Systems
Bitsight TRACE explores several critical vulnerabilities discovered in ATG systems and their inherent risk when exposed to the Internet.
The cybersecurity controls used to manage an organization’s cybersecurity program in previous years will not work against bad actors targeting networks today. Organizations rely more on cloud computing technology, connecting their sensitive data to more third party networks and in turn expanding their attack surface.
Here are some key tips for presenting the outcomes tracked by exposure management in a way that will be most helpful to the board and business stakeholders.
With the right mindset and governance, visibility into enterprise exposures can push priorities all the way up into the strategic realm of enterprise risk management—whilst enabling a threat informed defense posture.
Dive into the realm of cybersecurity excellence, harnessing the power of exposure management and benchmarking to drive proactive resilience with peer insights.
You may have heard the term “digital supply chain management” being used to describe an emerging business function. But what exactly is a digital supply chain, and how is one supposed to manage it?
Discover the complexities of exposure management in the cybersecurity landscape, as we dissect the acronyms and delve into the fundamental need for better visibility into asset states.
Tim Grieveson from Bitsight discusses strategies for managing Shadow IT, emphasizing the need for cybersecurity leaders to balance security and convenience.
When it comes to managing hidden risk and shadow IT, our primary challenge as cybersecurity practitioners is securing the organization’s data and applications while empowering users to perform their duties efficiently.
Create a comprehensive policy that includes detection, reporting, and control measures to manage shadow IT.
Explore the impact of the SEC's new breach disclosure rules on CISOs and the crucial role of cyber exposure management in streamlining compliance and enhancing enterprise risk management.
Shadow IT risks are growing—but that’s just the tip of the iceberg when it comes to hidden risks across today’s expanding attack surface.
Bitsight's Auto Vendor Discovery empowers teams to effortlessly uncover and navigate the complexities of third-party relationships, providing invaluable insights that drive actions, mitigate risks, and ensure a healthy program.
Bitsight and Google have collaborated to study global organizational performance across cybersecurity controls in the Minimum Viable Secure Product (MVSP) framework.
Recently, organizations were alerted to nearly 100,000 exposed ICS, potentially allowing an attacker to access and control physical infrastructure. Discover the risks.
How cybersecurity leaders can manage an expanding attack surface, increasing vulnerabilities, and growing demands from stakeholders.