Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Slicing through CISA’s KEV Catalog
![Blog Image KEV Research Announcement](/sites/default/files/styles/cta/public/2024/05/01/Blog%20Image%20KEV%20Research%20Announcement.png?itok=dUMFV8Tg)
Slicing through CISA’s KEV Catalog
Dive into the critical insights of CISA's Known Exploited Vulnerabilities (KEV) Catalog with Bitsight’s latest blog! Discover how KEVs, which signal urgent cybersecurity risks, are being tracked and mitigated across industries. Learn why addressing these vulnerabilities quickly is vital and how it impacts organizational security.
![spend end of year budget](/sites/default/files/styles/4_3_small/public/2022/11/24/end%20of%20year%20budget%20spend.png.webp?itok=WDy219Ds)
Wondering how to leverage your remaining funds? As you decide how to use your end of year budget, ask yourself these questions.
![Vendor cybersecurity practices](/sites/default/files/styles/4_3_small/public/2022/10/06/Vendor%20Cybersecurity%20Practices%2C%20SIZED.jpg.webp?itok=SWyqYnLZ)
Learn about the five most important vendor cybersecurity practices to include in your third-party risk management program.
![vrm partner](/sites/default/files/styles/4_3_small/public/2022/09/13/shutterstock_1115081195_0.jpg.webp?itok=ZwNgVpL4)
Bitsight has launched our Vendor Risk Management product to help address the evolving needs of third-party risk managers, powered by our acquisition of ThirdPartyTrust.
![pane of glass](/sites/default/files/styles/4_3_small/public/2022/09/09/shutterstock_1171955884.jpg.webp?itok=Oz5EmQFY)
Improve visibility into third-party risk with a single pane of glass approach to vendor risk management – from onboarding through the life of the relationship.
![supplier due dilligence](/sites/default/files/styles/4_3_small/public/2022/09/02/shutterstock_1995058496.jpg.webp?itok=VcUSR-jp)
Supplier due diligence can protect your organization from third-party risk. Here are best practices for doing it effectively.
![BitSight + ThirdPartyTrust](/sites/default/files/styles/4_3_small/public/2022/07/13/bitsight-plus-thirdpartytrust-banner-min.jpg.webp?itok=Z7BuDnBi)
The addition of ThirdPartyTrust expands the Bitsight TPRM offering to deliver an end-to-end third-party risk management solution for global vendor risk management teams.
![Vendors, Diligence, Continuous monitoring](/sites/default/files/styles/4_3_small/public/2022/08/11/vendor%20due%20diligence%20process%20sized.jpg.webp?itok=bCzmtSzT)
Learn how to combat growing third-party cyber threats with automation and an effective vendor due diligence process.
![Bitsight_rensomware_in_third_party_networks](/sites/default/files/styles/4_3_small/public/2022/07/26/Bitsight_rensomware_in_third_party_networks_600x350_Opt2%20%281%29.png.webp?itok=dbWb-5Lh)
Ransomware can gain access to your network through your third party ecosystem - and it may be more likely than you think. Read our latest blog to learn the three most effective ways to defend against third party ransomware risk.
![Third-Party Vendor Risk Management for Financial Institutions](/sites/default/files/styles/4_3_small/public/2022/02/18/Third-Party%20Vendor%20Risk%20Management%20for%20Financial%20Institutions.png.webp?itok=9j-pJubH)
According to the 2022 Verizon Data Breach Investigations Report, 62% of system intrusions came through an organization’s partner. Read our blog to learn how to assess your vendors to effectively reduce breach risk.
![Cyber Preparedness](/sites/default/files/styles/4_3_small/public/2022/05/31/Cyber%20Preparedness.jpg.webp?itok=uCewOJx-)
Learn about the four pillars of cyber preparedness and why it’s everyone’s responsibility to get involved.
![How Do I Know if I am at Risk for a Ransomware Attack?](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_1228736578_0.png.webp?itok=JY0MfgIE)
Ransomware isn’t going away; security leaders need to get inside the brain of ransomware sleuths and learn how attacks develop to better identify early indicators of ransomware in their network. Read on to learn how ransomware attacks happen.
![State of Cyber Resilience](/sites/default/files/styles/4_3_small/public/2022/05/09/State%20of%20Cyber%20Resilience%2C%20SIZED.jpg.webp?itok=ttCWjcFs)
Learn what you can do to defend against cyber attacks and achieve a state of cyber resilience.
![Announcing BitSight at RSA 2022](/sites/default/files/styles/4_3_small/public/2022/04/19/Visit%20BitSight%20at%20RSA%202022%20-%20Sized.jpg.webp?itok=CJoLZUbL)
Join Bitsight at the RSA Conference to learn the latest trends, real-life best practices, and valuable solutions that keep your company protected.
![Keys to the Kingdom: Single Sign-On (SSO) is Under Attack](/sites/default/files/styles/4_3_small/public/2022/04/11/Keys%20to%20the%20Kingdom%2C%20%20Sized.jpg.webp?itok=lVMhnDiC)
This article contains tips for security and risk professionals to manage risk from their Single Sign-On (SSO) providers and better protect their users’ credentials.
![Gartner Predicts Cybersecurity, 4 insights for 2022](/sites/default/files/styles/4_3_small/public/2022/03/29/Announcing%20Gartner%20Predicts%2C%20Sized.jpg.webp?itok=td-_OEmE)
The latest report from Gartner® outlines several key areas that leaders need to pay close attention to if they want to create more resilient, trusted programs.