Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Slicing through CISA’s KEV Catalog
![Blog Image KEV Research Announcement](/sites/default/files/styles/cta/public/2024/05/01/Blog%20Image%20KEV%20Research%20Announcement.png?itok=dUMFV8Tg)
Slicing through CISA’s KEV Catalog
Dive into the critical insights of CISA's Known Exploited Vulnerabilities (KEV) Catalog with Bitsight’s latest blog! Discover how KEVs, which signal urgent cybersecurity risks, are being tracked and mitigated across industries. Learn why addressing these vulnerabilities quickly is vital and how it impacts organizational security.
![exposure management](/sites/default/files/styles/4_3_small/public/2023/07/10/Exposure%20Management%2C%20SIZED.jpeg.webp?itok=WB1l31-n)
What is exposure management? Learn how you can assess your organization’s cyber risk exposure and get ahead of cyber risk.
![New research reveals rapid remediation of MOVEit Transfer vulnerabilities](/sites/default/files/styles/4_3_small/public/2024/03/27/New%20research%20reveals%20rapid%20remediation%20of%20MOVEit%20Transfer%20vulnerabilities_0.jpg.webp?itok=3HH1Rrk6)
CVE-2023-35036 & CVE-2023-35708 — were identified on June 9th and June 15th in the latest series of high-profile software supply chain vulnerabilities.
![cyber risk exposure](/sites/default/files/styles/4_3_small/public/2023/06/28/Cyber%20risk%20exposure%2C%20SIZED.jpeg.webp?itok=uoT45bM6)
Cyber risk exposure is the sum of the vulnerabilities and risks associated with your organization’s digital footprint. Here’s how to understand and manage it.
![5 Percent Rule Blog](/sites/default/files/styles/4_3_small/public/2023/04/28/5%20Percent%20Rule%20Blog.jpg.webp?itok=jwGrKm2Y)
Here’s the important question: With cyber vulnerabilities rising and presenting increasingly serious risks, are organizations doing enough to fight back? The answer might surprise you.
![New vulnerability discovered by Bitsight can lead to dos attack](/sites/default/files/styles/4_3_small/public/2023/05/26/New-vulnerability-discovered-by-bitsight-dos-attack.jpg.webp?itok=14z66npl)
The other week, Bitsight released a piece of high-profile research alerting the public to a high-severity vulnerability. Here’s a summary of what happened and why it matters.
![IoT Cybersecurity: How Your Organization Can Tame the Wild West](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_1462012349_0.png.webp?itok=cnzO3Eiz)
From sensors on the factory floor to those that guide autonomous vehicles, the Internet of Things (IoT) is transforming how we live and work. Over the coming years, IoT will continue to change our world, with the number of connected devices expected to grow from 13.8 billion units in 2021 to 30.9 billion by 2025.
![Vulnerability alert](/sites/default/files/styles/4_3_small/public/2023/04/26/Vulnerability%20alert-min.jpg.webp?itok=PREnq-Uj)
Researchers from Bitsight and Curesec have jointly discovered a high-severity vulnerability — tracked as CVE-2023-29552 — in the Service Location Protocol (SLP).
![What are Cyber Security False Positives & How To Prevent Them](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_1840324507_0.png.webp?itok=O12SHPDH)
Imagine you've alerted your IT team to a critical infrastructure error plaguing your network. You ask them to drop their current work and focus on immediate remediation of this detected vulnerability. After further investigation, however, it is found to be a false positive.
![Practical advice to secure your expanding attack surface](/sites/default/files/styles/4_3_small/public/2023/03/21/Practical%20advice%20to%20secure%20your%20expanding%20attack%20surface.png.webp?itok=orBunXpe)
Bitsight published research identifying exposed webcams. In light of that, Orgs must develop an understanding of how to handle the expanding attack surface.
![What Is Digital Supply Chain Management?](/sites/default/files/styles/4_3_small/public/migration/images/what-is-digital-supply-chain-management_1.jpeg.webp?itok=joKcTfoO)
You may have heard the term “digital supply chain management” being used to describe an emerging business function. But what exactly is a digital supply chain, and how is one supposed to manage it?
![Cybersecurity Controls Every Organization Needs in 2021](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_751366552_1.jpg.webp?itok=otMY67CO)
The cybersecurity controls used to manage an organization’s cybersecurity program in previous years will not work against bad actors targeting networks today. Organizations rely more on cloud computing technology, connecting their sensitive data to more third party networks and in turn expanding their attack surface.
![supplier](/sites/default/files/styles/4_3_small/public/2022/12/28/Shutterstock_2015833799.jpg.webp?itok=E7nWgJra)
Your vendors’ vendors can pose significant cyber risk to your organization. Learn more about fourth-party risk and how to manage it.
![Schneider Announcement](/sites/default/files/styles/4_3_small/public/2023/10/13/bitsight-schneider-electric-blog-banner-min.jpg.webp?itok=gSophSL0)
Cybersecurity threats targeting operational technology (OT) present costly challenges for organizations globally. Learn why Bitsight partnered with Schneider Electric to bring customers enhanced Industrial Control System (ICS) detection capabilities. Read more.