Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Slicing through CISA’s KEV Catalog
![Blog Image KEV Research Announcement](/sites/default/files/styles/cta/public/2024/05/01/Blog%20Image%20KEV%20Research%20Announcement.png?itok=dUMFV8Tg)
Slicing through CISA’s KEV Catalog
Dive into the critical insights of CISA's Known Exploited Vulnerabilities (KEV) Catalog with Bitsight’s latest blog! Discover how KEVs, which signal urgent cybersecurity risks, are being tracked and mitigated across industries. Learn why addressing these vulnerabilities quickly is vital and how it impacts organizational security.
![Vendor Due Diligence Checklist](/sites/default/files/styles/4_3_small/public/migration/images/Vendor_Due_Diligence_Checklist_31_Steps_to_Selecting_a_Third_Party_1.jpeg.webp?itok=N05-Q8fL)
The vendor due diligence checklist to steer your procurement decision-making in 5 simple steps. First step: always collect the 7 basic business details.
![3 Software Tools Transforming the Vendor Selection Process](/sites/default/files/styles/4_3_small/public/migration/images/3_Software_Tools_Transforming_the_Vendor_Selection_Process_1.jpeg.webp?itok=wKLCgF24)
The world of procurement has been fundamentally changed by the introduction of technology. Source-to-pay software has brought digital workflows and automation to time-consuming processes like creating RFPs, managing contracts, and remitting payments.
![Automated vendor risk assessment program](/sites/default/files/styles/4_3_small/public/2023/03/13/Automated%20Vendor%20Risk%20Assessment%2C%20SIZED.jpg.webp?itok=3Lq_qH-m)
Using automated vendor risk assessment capabilities and tools you can eliminate manual processes, scale your VRM program, and quickly mitigate risk.
![workflow](/sites/default/files/styles/4_3_small/public/2022/07/13/shutterstock_2102194204.jpg.webp?itok=YRSbAF8-)
Bitsight has integrated with Archer to bring vendor risk management to the next level of efficiency. Learn what the integration can bring to your third party risk management program.
![third party breach](/sites/default/files/styles/4_3_small/public/2022/11/15/shutterstock_1407081185.jpg.webp?itok=H68LvNRh)
We are constantly evolving our offerings to meet customer needs and address market shifts. Read our blog to learn about our customer-first enhancements to the Bitsight for Third-Party Risk Management Platform.
![Vendor, Security posture](/sites/default/files/styles/4_3_small/public/2022/07/15/How%20to%20Measure%20Your%20Vendors%E2%80%99%20Security%20Posture%20sized.jpg.webp?itok=sxgKuouB)
Learn how to onboard vendors securely and at speed with automated, data-driven insights into your vendors’ security postures.
![vendor risk management checklist](/sites/default/files/styles/4_3_small/public/2023/06/16/vendor%20risk%20management%20checklist.jpeg.webp?itok=xGsunN94)
A vendor risk management checklist will ensure you capture relevant information from your vendors during the onboarding process. Here’s what to include.
![Vendor lifecycle management process](/sites/default/files/styles/4_3_small/public/2023/03/16/vendor%20lifecycle%20management%20process%2C%20SIZED.jpg.webp?itok=Sdh_-K8E)
The vendor lifecycle management process involves understanding and remediating third-party risk at every stage of the relationship, from onboarding to offboarding.
![Vendor cybersecurity practices](/sites/default/files/styles/4_3_small/public/2022/10/06/Vendor%20Cybersecurity%20Practices%2C%20SIZED.jpg.webp?itok=SWyqYnLZ)
Learn about the five most important vendor cybersecurity practices to include in your third-party risk management program.
![vrm partner](/sites/default/files/styles/4_3_small/public/2022/09/13/shutterstock_1115081195_0.jpg.webp?itok=ZwNgVpL4)
Bitsight has launched our Vendor Risk Management product to help address the evolving needs of third-party risk managers, powered by our acquisition of ThirdPartyTrust.
![pane of glass](/sites/default/files/styles/4_3_small/public/2022/09/09/shutterstock_1171955884.jpg.webp?itok=Oz5EmQFY)
Improve visibility into third-party risk with a single pane of glass approach to vendor risk management – from onboarding through the life of the relationship.
![supplier due dilligence](/sites/default/files/styles/4_3_small/public/2022/09/02/shutterstock_1995058496.jpg.webp?itok=VcUSR-jp)
Supplier due diligence can protect your organization from third-party risk. Here are best practices for doing it effectively.
![Third-Party Vendor Risk Management for Financial Institutions](/sites/default/files/styles/4_3_small/public/2022/02/18/Third-Party%20Vendor%20Risk%20Management%20for%20Financial%20Institutions.png.webp?itok=9j-pJubH)
According to the 2022 Verizon Data Breach Investigations Report, 62% of system intrusions came through an organization’s partner. Read our blog to learn how to assess your vendors to effectively reduce breach risk.
![Measuring an acceptable level of supply chain risk](/sites/default/files/styles/4_3_small/public/2021/12/23/Inherent%20Cyber%20Risk%2C%20Sized.jpg.webp?itok=Qeb3gWyw)
What does your organization consider an acceptable level of inherent cyber risk in its vendor portfolio? Learn how to establish that threshold and focus resources where they’re needed most.
![How Continuous Vendor Monitoring Can Prevent Service Interruptions](/sites/default/files/styles/4_3_small/public/migration/images/bigstock--160637267_1.jpg.webp?itok=x2-ojTBt)
On a Friday morning in October 2016, millions of people across North America attempted to visit popular websites including Spotify, Reddit, and the New York Times, only to find that they were inaccessible.