Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Slicing through CISA’s KEV Catalog
![Blog Image KEV Research Announcement](/sites/default/files/styles/cta/public/2024/05/01/Blog%20Image%20KEV%20Research%20Announcement.png?itok=dUMFV8Tg)
Slicing through CISA’s KEV Catalog
Dive into the critical insights of CISA's Known Exploited Vulnerabilities (KEV) Catalog with Bitsight’s latest blog! Discover how KEVs, which signal urgent cybersecurity risks, are being tracked and mitigated across industries. Learn why addressing these vulnerabilities quickly is vital and how it impacts organizational security.
![Creating A Successful Third Party Risk Management Program](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_1499306735%2520%25281%2529_1.jpg.webp?itok=3SUPohY-)
As digital transformation picks up pace, companies are working with more vendors than ever. According to Gartner, 60% of organizations now work with more than 1,000 third-party vendors — including partners, sub-contractors, and suppliers.
![Security risk management leader](/sites/default/files/styles/4_3_small/public/2022/10/28/Security%20Risk%20Management%20Leader%2C%20SIZED.jpg.webp?itok=bI6juTrc)
Cyber risk is now business risk and this means the role of the security risk management leader must be reframed. Learn how.
![Continuous security testing, Continuous Monitoring, Third Party Risk](/sites/default/files/styles/4_3_small/public/2022/08/18/continuous%20security%20testing%20sized.jpg.webp?itok=vIOq2K-v)
What is continuous monitoring vs. continuous security testing and why you need both to protect your organization against third-party risk.
![5 Percent Rule Blog](/sites/default/files/styles/4_3_small/public/2023/04/28/5%20Percent%20Rule%20Blog.jpg.webp?itok=jwGrKm2Y)
Here’s the important question: With cyber vulnerabilities rising and presenting increasingly serious risks, are organizations doing enough to fight back? The answer might surprise you.
![devops blog banner](/sites/default/files/styles/4_3_small/public/2022/09/07/devops-blog-banner-min.jpg.webp?itok=WNhnsDhM)
Data is something that impacts so many different touch points of your business, which is why Data Ops makes life easier for everyone.
![cyber risk management strategy](/sites/default/files/styles/4_3_small/public/2023/06/21/AdobeStock_95077045.jpeg.webp?itok=dOcaRxvr)
These are the basic steps you should take to develop an effective cyber risk management strategy.
![Cybersecurity risk taxonomy, image of four cybsersecurity professionals, two individuals on cell phones](/sites/default/files/styles/4_3_small/public/2021/12/20/Cybersecurity%20Risk%20Taxonomy%20Sized_0.jpg.webp?itok=4o1QaFz3)
What is a cybersecurity risk taxonomy and how can you use it to guide your organization’s security program and investments?
![Self publish and primary rating](/sites/default/files/styles/4_3_small/public/2022/12/19/Self%20Publish%20Primary%20Rating%20blog%20image.jpg.webp?itok=UW-e_j6L)
Bitsight enables companies to create a rating based on the infrastructure that best represents their company, called a Self-Published rating, and then share it publicly as a Primary Rating
![Digital Transformation Risk, woman working from home as part of digital transformation and cloud](/sites/default/files/styles/4_3_small/public/2023/05/19/Digital%20Transformation%20Risk%20SIZED.jpg.webp?itok=IlycouRX)
Learn how to identify and mitigate digital transformation risks—internally and across your software supply chain.
![How the Internet of Things Affects Your Corporate Network](/sites/default/files/styles/4_3_small/public/migration/images/Internet_of_Things_1.jpg.webp?itok=mWjp5yYf)
Almost every day there seems to be another story about the “Internet of Things" (IoT). More and more “things” are being equipped to send and receive information over the internet. It might be fun to have your running shoes connecting to the cloud, but what does it mean, if anything, to your corporate network?
![Vendor, Security posture](/sites/default/files/styles/4_3_small/public/2022/07/15/How%20to%20Measure%20Your%20Vendors%E2%80%99%20Security%20Posture%20sized.jpg.webp?itok=sxgKuouB)
Learn how to onboard vendors securely and at speed with automated, data-driven insights into your vendors’ security postures.
![Evidence-Based Strategies for Ransomware Prevention](/sites/default/files/styles/4_3_small/public/migration/images/shutterstock_1044801037_0.jpg.webp?itok=i_B0b8TI)
Ransomware is getting more sophisticated, and 1 in 4 breaches involve ransomware. Bitsight analyzed hundreds of ransomware events to estimate the relative probability that an organization will experience a ransomware event. Four areas bubble to the top.
![Verizon 2023 DBIR-Bitsight perspective](/sites/default/files/styles/4_3_small/public/2023/06/16/Verizon%202023%20DBIR-Bitsight%20perspective.jpg.webp?itok=53twQjG0)
Verizon’s much anticipated 2023 Data Breach Investigations Report (DBIR) is out and we have the missing pieces you need to convert its findings into action.
![How to Mitigate Supply Chain Attacks](/sites/default/files/styles/4_3_small/public/2023/04/27/supply-chain-attack.jpg.webp?itok=WpqMP6kN)
Learn how to mitigate supply chain attacks by improving visibility into your third-party attack surface.
![vendor risk management checklist](/sites/default/files/styles/4_3_small/public/2023/06/16/vendor%20risk%20management%20checklist.jpeg.webp?itok=xGsunN94)
A vendor risk management checklist will ensure you capture relevant information from your vendors during the onboarding process. Here’s what to include.