Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.

Critical Vulnerabilities Discovered in Automated Tank Gauge Systems
Bitsight TRACE explores several critical vulnerabilities discovered in ATG systems and their inherent risk when exposed to the Internet.

In this guide, discover how digital fingerprinting identifies devices & users using unique system traits for cybersecurity, threat intel, and fraud prevention.

At Bitsight, our collective observations highlight five critical areas that will shape cybersecurity strategies in 2025.

Instant Insights for SOC 2 is a new feature that is available to Bitsight VRM customers at no additional cost. It uses advanced AI techniques to analyze and summarize SOC 2 doc and more!

Discover the biggest opportunities for enhanced risk insights on the horizon––and Bitsight's strategy for helping customers capitalize through ongoing enhancements to our data platform in 2025 and beyond.

Learn GDPR Compliance 101: Understand key principles, requirements, and steps to ensure data protection, avoid penalties, and build customer trust globally.

Understand SameSite, Same-Origin Policy, CORS, and Subresource Integrity (SRI) to enhance web security, manage cross-origin requests, and protect JavaScript.

CVE-2024-4577 is a critical vulnerability in Windows-based PHP installations, affecting CGI configurations, that allow remote code execution.

Third-party monitoring is the practice of gathering & analyzing data on the security posture of vendors in an organization’s supply chain. Learn the basics now.

APTs stand in stark contrast with most of the deep and dark web’s users, but they do exist. Learn 5 functions and examples of APTs on the deep, dark web.

For effective threat hunting, threat intelligence from deep & dark web sources is a fundamental prerequisite for success. Learn more about threat hunting now.