Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Slicing through CISA’s KEV Catalog
![Blog Image KEV Research Announcement](/sites/default/files/styles/cta/public/2024/05/01/Blog%20Image%20KEV%20Research%20Announcement.png?itok=dUMFV8Tg)
Slicing through CISA’s KEV Catalog
Dive into the critical insights of CISA's Known Exploited Vulnerabilities (KEV) Catalog with Bitsight’s latest blog! Discover how KEVs, which signal urgent cybersecurity risks, are being tracked and mitigated across industries. Learn why addressing these vulnerabilities quickly is vital and how it impacts organizational security.
![Representation of expanding digital ecosystem for cyber risk reduction](/sites/default/files/styles/4_3_small/public/2022/09/29/Cyber%20Risk%20Reduction.jpg.webp?itok=o39aLaUF)
Discover five practical cyber risk reduction strategies including understanding your attack surface, continuous monitoring, keeping software updated, and more.
![The BitSight and Moody's Partnership: A New Era For Cybersecurity](/sites/default/files/styles/4_3_small/public/migration/images/facebook-moodys-image-min_2.jpg.webp?itok=Sg6_IOaw)
Moody’s Investor Services published new research indicating worldwide cyber risk is rising, particularly among critical infrastructure entities.
![SystemBC malware banner](/sites/default/files/styles/4_3_small/public/2022/09/19/SystemBC-malware-banner-min.jpg.webp?itok=duCZ_7ia)
SystemBC is a malware written in C that turns infected computers into SOCKS5 proxies.
![vrm partner](/sites/default/files/styles/4_3_small/public/2022/09/13/shutterstock_1115081195_0.jpg.webp?itok=ZwNgVpL4)
Bitsight has launched our Vendor Risk Management product to help address the evolving needs of third-party risk managers, powered by our acquisition of ThirdPartyTrust.
![pane of glass](/sites/default/files/styles/4_3_small/public/2022/09/09/shutterstock_1171955884.jpg.webp?itok=Oz5EmQFY)
Improve visibility into third-party risk with a single pane of glass approach to vendor risk management – from onboarding through the life of the relationship.
![Person working on a computer that shows Bitsight Badge](/sites/default/files/styles/4_3_small/public/2022/09/08/Blog-Image-BitSight-Badge-v3.png.webp?itok=SDKAiBdE)
The Bitsight Badge enables an organization to prove their focus on security, increase transparency, and showcase the hard work they put into enhancing security performance.
![cybersecurity vs information security](/sites/default/files/styles/4_3_small/public/2022/01/03/Cybersecurity%20vs%20Information%20Security%2C%20Sized.jpg.webp?itok=QpuN0Sop)
Is there a difference between cybersecurity vs. information security? Learn more about the distinctions between the two areas, where they overlap, and how both have evolved.
![supplier due dilligence](/sites/default/files/styles/4_3_small/public/2022/09/02/shutterstock_1995058496.jpg.webp?itok=VcUSR-jp)
Supplier due diligence can protect your organization from third-party risk. Here are best practices for doing it effectively.
![BitSight + ThirdPartyTrust](/sites/default/files/styles/4_3_small/public/2022/07/13/bitsight-plus-thirdpartytrust-banner-min.jpg.webp?itok=Z7BuDnBi)
The addition of ThirdPartyTrust expands the Bitsight TPRM offering to deliver an end-to-end third-party risk management solution for global vendor risk management teams.
![Offboarding, Onboarding, Hiring, Recruit](/sites/default/files/styles/4_3_small/public/2022/08/26/The%20Case%20for%20Offboarding%20sized.jpg.webp?itok=E7A8ObtP)
Few organizations institute a thorough offboarding process for service providers, sometimes resulting in leftover certificates that expire after a time, stale records at the Regional Internet Registries, and other artifacts as organizations beat a retreat from contracts.
![The Problem with Modern Supply Chains](/sites/default/files/styles/4_3_small/public/2022/08/16/The%20Problem%20with%20Modern%20Supply%20Chains-min.jpg.webp?itok=XWzQNAuO)
The modern attack surface is expanding, presenting new challenges to the status quo of cyber supply chain risk management. Let’s analyze the evolving landscape, and highlight key shifts important to your organization.
![Vendors, Diligence, Continuous monitoring](/sites/default/files/styles/4_3_small/public/2022/08/11/vendor%20due%20diligence%20process%20sized.jpg.webp?itok=bCzmtSzT)
Learn how to combat growing third-party cyber threats with automation and an effective vendor due diligence process.
![what is malware](/sites/default/files/styles/4_3_small/public/2022/06/13/shutterstock_1326113375.jpg.webp?itok=1HZUZvHB)
Emotet is back in business, and Bitsight's Threat Research team is continuously monitoring the evolution of this dangerous malware. See our latest findings.
![board cybersecurity committee, Communication, SEC ruling](/sites/default/files/styles/4_3_small/public/2022/08/04/board%20cybersecurity%20committee%20sized.jpg.webp?itok=1El5oSqx)
What is a board cybersecurity committee? Learn why it’s more critical than ever and how your organization can establish one.
![city with connected devices](/sites/default/files/styles/4_3_small/public/2022/08/03/city%20with%20connected%20devices_iot.jpg.webp?itok=0JabPv1J)
Discover how Bitsight’s GPS vulnerability research can help your organization and third party managers reduce IoT device cyber risk.