Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Critical Vulnerabilities Discovered in Automated Tank Gauge Systems
Bitsight TRACE explores several critical vulnerabilities discovered in ATG systems and their inherent risk when exposed to the Internet.
Learn how to mitigate supply chain attacks by improving visibility into your third-party attack surface.
Data exfiltration is the unauthorized transfer of data from a host device, such as an application, database, or server. Here’s how you can prevent it.
Third-party vendors are a vital part of your business ecosystem. But if you’re not careful, these companies can introduce cyber risk. The SolarWinds supply chain hack is a notable example of the jeopardy that even the most trusted partnerships can yield.
Learn how to centralize, automate, and streamline your VRM process to manage hundreds of vendors as effectively as you manage ten.
What is a cyber resilience framework? Learn how your organization can better prepare for, respond to, and recover from a cyber attack.
Learn the basic principles of Zero Trust and how to apply them to your third-party risk management program to create more secure remote access connections.
Recently we wrote about the top cybersecurity frameworks to reduce cybersecurity risk, and the Federal Information Security Management Act (FISMA) certainly belongs in that list. But what is FISMA? Who does it apply to? Why is it so important?
Learn how to automate and streamline the process for third-party vendor risk management at financial institutions.
Learn what ISO 27001 controls apply to vendor risk management and how to successfully map them to your VRM framework.
A study reveals the correlation between these security flaws and the likelihood of cybersecurity incidents. Learn more.
Bitsight is partnering with Google Cloud to provide customers with a centralized repository of Google Cloud questionnaires, certifications, and documentation, now available through Bitsight Vendor Risk Management. Learn more about the partnership in our blog.
These questions will help you choose the best VRM tool that will take your program to the next level.
Cybersecurity threats targeting operational technology (OT) present costly challenges for organizations globally. Learn why Bitsight partnered with Schneider Electric to bring customers enhanced Industrial Control System (ICS) detection capabilities. Read more.
Gain visibility into fourth-party supplier risk, continuously monitor for emerging risks, and communicate program performance to stakeholders.
Your interconnected supply chain needs trust in you, and you in them. But how can you build trust when visibility is low and resources are limited?