Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Slicing through CISA’s KEV Catalog
![Blog Image KEV Research Announcement](/sites/default/files/styles/cta/public/2024/05/01/Blog%20Image%20KEV%20Research%20Announcement.png?itok=dUMFV8Tg)
Slicing through CISA’s KEV Catalog
Dive into the critical insights of CISA's Known Exploited Vulnerabilities (KEV) Catalog with Bitsight’s latest blog! Discover how KEVs, which signal urgent cybersecurity risks, are being tracked and mitigated across industries. Learn why addressing these vulnerabilities quickly is vital and how it impacts organizational security.
![4 Ways to Improve Cybersecurity Collaboration Between Security Teams and the C-Suite](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_748719808.png.webp?itok=6ol21rwz)
Recent events have made cybersecurity a top concern among C-suite executives. The SolarWinds breach, Capital One incident, and Colonial Pipeline attack are just a few of the noteworthy events that have made CEOs and CFOs take active roles in discussions around risk mitigation.
![Cyber Security Assessment Tools and Platforms | BitSight](/sites/default/files/styles/4_3_small/public/migration/images/Cybersecurity_Risk_Assessment_Tools_You_Can_Use_Year_Round_2.jpeg.webp?itok=YMKy2vZ9)
When it comes to improving cybersecurity at your organization, there are some fixes that you can undertake with very little preparation. More robust remediation efforts, however, usually start with a cybersecurity risk assessment.
![cloud security posture - bitsight](/sites/default/files/styles/4_3_small/public/2023/08/21/cloud%20security%20posture%20-%20bitsight.jpeg.webp?itok=ovEIqVbn)
As cyberattacks against cloud services and infrastructure increase, follow these best practices to improve your cloud security posture management.
![cyber threat prevention digital footprint](/sites/default/files/styles/4_3_small/public/2023/06/12/cyber%20threat%20prevention%20digital%20footprint.jpeg.webp?itok=S2oMadJ-)
We look at five ways you can reduce cyber threats without putting additional pressure on stretched resources.
![Cybersecurity Reporting](/sites/default/files/styles/4_3_small/public/2023/05/01/Cybersecurity-Reporting.jpg.webp?itok=NJVNq7cv)
A majority of boards now see cyber risk as business risk, so they’re asking hard questions around risk and exposure. Security leaders must have processes in place to inform and educate executives, boards, and stakeholders as to the security posture of the organization as well as the postures of important third parties.
![Do You Have What it Takes to Achieve Digital Resilience?](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_1709609737.jpg.webp?itok=wbHtLeTI)
The term “digital resilience” has gained momentum over the past few years as cybersecurity threats have grown, but what does it really mean? And how can a company become digitally resilient?
![Bitsight and Diligent partner](/sites/default/files/styles/4_3_small/public/2023/07/18/Diligent-and-Bitsight.jpg.webp?itok=K44DP7gJ)
Bitsight & Diligent launch extension partnership focused on correlated, independent, & comparable cyber ratings within Diligent’s Board Reporting for IT Risk.
![What is Cyber Security Performance Management?](/sites/default/files/styles/4_3_small/public/migration/images/What%2520is%2520SPM_1.png.webp?itok=kJBnM6Dp)
Security performance management (SPM) helps security and risk leaders take a risk-based, outcome-driven approach to assessing and managing the performance of their organization’s cybersecurity program. With SPM, security leaders can continuously monitor and assess their organization’s current security state, analyze how security performance ranks against industry and peers, and create improvement plans that reduce cyber risk.
![What is Digital Risk Protection?](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_672114784-1_1.jpg.webp?itok=yYQx79mf)
Digital risk protection (DRP) solutions can be powerful operational tools for security analysts and threat researchers looking to identify and address existing cyber risk exposures quickly. While these solutions can provide valuable assessments, they focus on short-term outcomes rather than long-term ones. DRP tools are more tactical than strategic in nature — and often do not provide the necessary context to make informed business decisions.
![what is malware](/sites/default/files/styles/4_3_small/public/2022/06/13/shutterstock_1326113375.jpg.webp?itok=1HZUZvHB)
Malware can gain entry to your network in many ways. Once malware has penetrated a network, threat actors can use it to steal information, encrypt systems, spy on users, and remove files. Learn how to prevent dangerous malware.
![cybersecurity intelligence](/sites/default/files/styles/4_3_small/public/2023/08/03/cybersecurity%20intelligence.jpeg.webp?itok=-AuPpnQu)
Cybersecurity intelligence is a powerful weapon against risk. Learn how you can improve your cyber data collection, analysis, and sharing to mitigate emerging threats.
![what is vulnerability management](/sites/default/files/styles/4_3_small/public/2023/03/08/what%20is%20vulnerability%20management.jpg.webp?itok=-1gUWtzs)
As the attack surface expands, vulnerability management offers a strategic approach to manage exposure and remediate on time. Here's what you need to know.
![4 Tips for Reducing Your Company’s Cyber Exposure](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_1363031135_0.png.webp?itok=iN8eQUvX)
If your organization is like many others, its cyber exposure continues to grow over time. During the pandemic, as attackers sought to exploit unprecedented changes in work environments, 35% of cyberattacks used previously unseen malware or methods, up from the norm of 20%. And with the average enterprise using well over 1,000 cloud services, it can be very difficult to get a handle on potential vulnerabilities or to know when risks will pop up.
![financial services cybersecurity](/sites/default/files/styles/4_3_small/public/2021/11/14/financial%20services.jpg.webp?itok=6nD94pl3)
The financial services sector is one of the highest performing in terms of cybersecurity. One factor that contributes to this performance is regulation.
![Cyber Security Risk Modeling: What Is It And How Does It Benefit Your Organization?](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_1563144256.jpg.webp?itok=_b7jre04)
As cyber security threats proliferate, cyber risk conversations are no longer limited to the Security Operations Center (SOC); they command the attention of the C-suite and the boardroom.