Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Slicing through CISA’s KEV Catalog
![Blog Image KEV Research Announcement](/sites/default/files/styles/cta/public/2024/05/01/Blog%20Image%20KEV%20Research%20Announcement.png?itok=dUMFV8Tg)
Slicing through CISA’s KEV Catalog
Dive into the critical insights of CISA's Known Exploited Vulnerabilities (KEV) Catalog with Bitsight’s latest blog! Discover how KEVs, which signal urgent cybersecurity risks, are being tracked and mitigated across industries. Learn why addressing these vulnerabilities quickly is vital and how it impacts organizational security.
![vendor risk management questionnaires](/sites/default/files/styles/4_3_small/public/2023/01/10/vendor%20risk%20management%20questionnaires.jpg.webp?itok=02ZKoXsI)
We explore the most common security questionnaires and how to integrate them into your overall VRM process.
![2023 cybersecurity trends](/sites/default/files/styles/4_3_small/public/2023/01/05/2023%20Cybersecurity%20Trends%2C%20SIZED.jpg.webp?itok=ZeCV0pCH)
Bitsight teamed with Moody’s Investors Service to discuss the cybersecurity trends to watch in 2023 and how security leaders can adapt their programs to increase preparedness.
![questions before buying vrm tool](/sites/default/files/styles/4_3_small/public/2023/01/10/questions%20before%20buying%20vrm%20tool.jpg.webp?itok=Mq3wKpbK)
These questions will help you choose the best VRM tool that will take your program to the next level.
![HTTP Redirect](/sites/default/files/styles/4_3_small/public/2023/01/04/HTTP%20Redirect%2C%20SIZED.jpg.webp?itok=lbMNtt1A)
HTTP redirects are a common technique to ensure website visitors see the same content when they type different, yet related, domains in the URL bar of their browser. But any connection to an HTTP site comes with risk.
![What is Vendor Risk Management (VRM)?](/sites/default/files/styles/4_3_small/public/migration/images/Vendor%2520Risk%2520Management%2520Definition%2520-%2520FB%2520Social%2520Graphic%2520Main%2520Blog%2520Image_1.jpg.webp?itok=VhW-jURH)
Vendor Risk Management is the practice of evaluating business partners, suppliers, or third-party vendors both before a business relationship is established and during the duration of your business contract. This is an important concept and practice to put in place during the evaluation of your vendors and the procurement process.
![Schneider Announcement](/sites/default/files/styles/4_3_small/public/2023/10/13/bitsight-schneider-electric-blog-banner-min.jpg.webp?itok=gSophSL0)
Cybersecurity threats targeting operational technology (OT) present costly challenges for organizations globally. Learn why Bitsight partnered with Schneider Electric to bring customers enhanced Industrial Control System (ICS) detection capabilities. Read more.
![financial risk](/sites/default/files/styles/4_3_small/public/2022/12/28/shutterstock_1389723656_0.jpg.webp?itok=7RhkCCm6)
Learn how to measure the financial impact of cyber attacks so you can have meaningful conversations with business leaders about risk management.
![Analyzing Exposed SSO Credentials of Public Companies](/sites/default/files/styles/4_3_small/public/2022/09/14/Analyzing-Exposed-SSO-Credentials-of-Public-Companies-new.jpg.webp?itok=WuV2vgtg)
Bitsight found that 25% of the S&P 500 and half of the top 20 most valuable public U.S companies have had at least one SSO credential for sale on the dark web in 2022. Read the full analysis.
![fourth party supplier risk](/sites/default/files/styles/4_3_small/public/2022/12/16/Fourth%20Party%20Supplier%20Risk%2C%20SIZED.jpg.webp?itok=9pZMnFUC)
Gain visibility into fourth-party supplier risk, continuously monitor for emerging risks, and communicate program performance to stakeholders.
![Strengthen Security Performance through Accurate Data and Advanced Analytics](/sites/default/files/styles/4_3_small/public/2022/12/21/Advanced%20Analytics%20Blog%2Cjpg.jpg.webp?itok=hJeB3TkG)
Making the best cybersecurity decisions starts with a strong foundation of data and utilizing advanced analytics to track security performance.
![2022 cybersecurity recap blog](/sites/default/files/styles/4_3_small/public/2022/12/15/Top%205%20Topics%20from%202022.jpg.webp?itok=uoe3lHkO)
Take a look at our 2022 cybersecurity recap and trends and see what blogs our readers have been most interested in throughout the year.
![creating trust with data](/sites/default/files/styles/4_3_small/public/2022/12/14/creating%20trust%20sized.png.webp?itok=Ib2JN0e9)
Your interconnected supply chain needs trust in you, and you in them. But how can you build trust when visibility is low and resources are limited?
![third party vs fourth party](/sites/default/files/styles/4_3_small/public/2022/12/08/Third%20Party%20vs%20Fourth%20Party%20SIZED.jpg.webp?itok=oxa1p1VB)
Learn the difference between third-party vs. fourth-party risk and how you can extend your risk management program to cover both.
![why vendor risk management is critical](/sites/default/files/styles/4_3_small/public/2022/12/06/3-reasons-vendor-risk-management-scaled-1-2048x1536_0.jpeg.webp?itok=R_n_b7Oi)
New outsourcing opportunities may present as you build next year’s strategy, making Vendor Risk Management (VRM) critical for three main reasons.
![Cova and Nosu malware](/sites/default/files/styles/4_3_small/public/2022/12/06/cova-and-nosu-blog-banner-min.jpg.webp?itok=aPWGVYL4)
Bitsight has discovered two previously undocumented malware families named Cova and Nosu. They have different purposes and capabilities, although we found some similarities during our research.